fkie_cve-2013-5696
Vulnerability from fkie_nvd
Published
2013-09-23 03:49
Modified
2025-04-11 00:51
Severity ?
Summary
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F2050C-A733-4E79-A59A-90B60DA26629",
"versionEndIncluding": "0.84.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B215CBB3-8525-475A-B5E2-34F62511C7C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "85995AA3-1818-4CA7-BB87-539E43BCBD04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BCBDF788-300F-4C67-A0B9-5CFB56BF52E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C5DA370-D9BA-4EFC-B3C3-79B6170BD6E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "ACCCAC60-7CF1-48ED-B38D-289CABA812AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BAFE68F5-2ED1-4566-8B8D-0CFCD71618CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "128758C3-10AF-4A4E-B994-DE0E1E35D38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "311DE5E1-25BF-430A-A059-00088B2286FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4D3744-1CDC-44D9-9480-B4FD61C585C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "84D0D26A-731B-4CF6-9D92-02ABB1941186",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "59F6A082-BC41-4C22-A1DF-77304DA6238C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "6B89364E-9D44-49F2-B9D6-7D7BA139FAAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "176F87B2-9395-4EC5-9201-A3D7A4955705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "93B2CF5E-C68F-4551-8B91-E6D69039744B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "71F0CC20-61C8-4538-9DFC-B275FDB549C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*",
"matchCriteriaId": "99AAB3E6-22E0-4BA0-A4D7-9C06A8C2FCA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*",
"matchCriteriaId": "B8940C0C-82F9-4209-A8D5-A70626F17E8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A157A31C-CF17-4307-814F-304B428D8799",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*",
"matchCriteriaId": "990FDC8A-6E09-4426-BBBE-B7DE56FD66E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*",
"matchCriteriaId": "65F994FF-3F3B-4301-AB0C-210576F74FE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F03828AC-AA8C-4AE4-BE3C-1789B4C888B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*",
"matchCriteriaId": "495826C7-2191-4120-BCAA-FB295350BD59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A78E9D3B-DEE0-495C-8375-6E1FD78C41A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F23BF2-781D-4A1D-B979-522BCD0863C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C69CDDCE-ECF5-490A-99E8-156258EC0927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6064A657-3E14-492E-9DF0-6471EF7057B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*",
"matchCriteriaId": "348A5071-E1DA-4462-B328-A350704BD070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E460C38B-125E-49BD-A616-4979BA9F08BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*",
"matchCriteriaId": "185201D0-8E00-48F7-B579-49ED8D25F7D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1CF28E43-B2A2-4ED4-8ECC-CC2E5C027448",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE47B2A4-297E-4057-BFF0-C7B75025E401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ECB55F-58A4-43FE-8995-3D1857DCC707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*",
"matchCriteriaId": "43503991-9AB8-4944-ABFA-E8A3FD600257",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02F2C381-E442-4B00-8147-2C8364145505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "64BE5EBC-333A-4792-B098-D62B74F1C262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F21003DB-A89B-451E-B0C3-E57017138A16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A5FD94F2-79E2-4FCD-A5A1-7A6E78938318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*",
"matchCriteriaId": "26DB5DB1-2366-48D0-B534-439EE6DB3921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7087437C-5B04-4AC5-9154-2377DF8060D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9D441EB0-C668-481A-8AE7-B88F2ED444D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8BEB7ABC-B924-45FC-AE2E-855985BA39B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1920E885-9119-4674-989B-E454FCD78950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*",
"matchCriteriaId": "E9DC7875-2A5C-4109-911B-90A10F04F414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7566410B-4314-4E84-B469-20EDCCBFB77E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1C5C9152-88C4-4D05-8D88-78371ADD6192",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*",
"matchCriteriaId": "024E39AB-F10D-4D42-B495-91FFADBBBBA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A9644DAB-3046-4C22-95CB-D69570631F5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B33C6E19-A3EE-42A6-B76F-5170F09E4EA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F94BBB55-D0EB-4088-B579-93BC1930315F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C7FF7C06-344D-4647-B9E0-E4223D6F7F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*",
"matchCriteriaId": "32250F48-9E4B-4F29-8D61-7762DA7F3C25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5784A35F-A07A-4570-B5AF-41F4BBBE61EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB9B3CD-9741-4620-85E7-9E98D3D08C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0AA1A5CA-F4D4-451A-92AE-02BBA292515B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C6ECFCF2-7415-4BB2-BFC6-B61E7779C055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6D88E5E6-547E-4E3F-AE0C-B5CC9ECCBD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*",
"matchCriteriaId": "12E8EC22-D5BB-42DD-8FD6-C8C89B2FF749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2397775-5240-444E-B735-D92621FCAB43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2007D9F-8CBD-455A-9E48-D69EB8D78C64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C9D446-A34F-4CA9-9F20-11B0E61E55E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4C160C2E-709E-4231-9F0F-5B9A1863AA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:*",
"matchCriteriaId": "65BD1072-84E8-4B14-9584-35CF02669000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0D55762E-7A45-4E57-A6D8-524D69A8CE9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.7:*:*:*:*:*:*:*",
"matchCriteriaId": "17774534-EB79-45E5-93FC-1E7741B87958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:*",
"matchCriteriaId": "F8F46AEE-EAC9-4771-B2AB-905CBFB67E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83:*:*:*:*:*:*:*",
"matchCriteriaId": "E14F94C4-4ED5-44A4-A017-5EC66E3210F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B80B37D-CAF3-4109-95A9-F49E28B938C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB316B74-8FE4-40A6-A0D3-C4CD88CB9656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D4574B9-E843-4D7A-A9E3-938051A048B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BB555723-6E7F-4D0F-92B9-BE1ACD7DBD97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9002F098-D328-413E-9A1D-14B5759C4B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1AC97A-6C1E-4AD4-B7E4-272224E2DBC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D54783ED-47B3-4A86-A905-3A47BF1DFFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79559192-8658-4587-83E7-48F79EDCA429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.9:*:*:*:*:*:*:*",
"matchCriteriaId": "00067606-F029-4B5E-AF10-303D26012883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.31:*:*:*:*:*:*:*",
"matchCriteriaId": "692076F9-0855-45B1-B19E-63C9D3902511",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.91:*:*:*:*:*:*:*",
"matchCriteriaId": "1C3BE0D5-55B3-4C08-902D-3A59EFF8BF1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glpi-project:glpi:0.84:*:*:*:*:*:*:*",
"matchCriteriaId": "FE160E31-49C5-495C-84AD-DECFFCFE3DBC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action."
},
{
"lang": "es",
"value": "inc/central.class.php en GLPI anteriores a 0.84.2 no intenta inhabilitar install/install.php despu\u00e9s de una instalaci\u00f3n completa, lo cual permite a atacantes remotos efectuar ataques cross-site request forgery (CSRF), y (1) ejecutar inyecciones SQL a trav\u00e9s de una acci\u00f3n Etape_4 o (2) ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de una acci\u00f3n update_1."
}
],
"id": "CVE-2013-5696",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-09-23T03:49:27.943",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=308"
},
{
"source": "cve@mitre.org",
"url": "https://forge.indepnet.net/issues/4480"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://forge.indepnet.net/issues/4480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…