Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-15175
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unauthenticated File Deletion in GLPI
Source: NVD (National Vulnerability Database)
Vulnerability Description
In GLPI before version 9.5.2, the `​pluginimage.send.php​` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对外部实体的文件或目录可访问
Source: NVD (National Vulnerability Database)
Vulnerability Title
GLPI 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GLPI是个人开发者的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI 9.5.2之前版本存在安全漏洞,该漏洞源于?pluginimage.send.php?端点允许用户指定一个图像从一个插件。可以恶意构造的参数而不是删除的。htaccess文件文件目录。任何用户就能够阅读所有的文件和文件夹包含在文件“/ /”。一些敏感信息的泄露用户会话,日志等等。攻击者可利用该漏洞能够获得管理
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
glpi-projectglpi < 9.5.2 -
II. Public POCs for CVE-2020-15175
#POC DescriptionSource LinkShenlong Link
1GLPI automatic exploitation tool for CVE-2020-15175https://github.com/Xn2/GLPwnPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-15175
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2020-15175

No comments yet


Leave a comment