Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-35914
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
GLPI 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GLPI是个人开发者的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI 10.0.2及之前版本存在安全漏洞,该漏洞源于htmlawed 模块中的 /vendor/htmlawed/htmlawed/htmLawedTest.php 允许 PHP 代码注入。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2022-35914
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/cosad3s/CVE-2022-35914-pocPOC Details
2Nonehttps://github.com/Lzer0Kx01/CVE-2022-35914POC Details
3Nonehttps://github.com/6E6L6F/CVE-2022-35914POC Details
4Unauthenticated RCE in GLPI 10.0.2https://github.com/0xGabe/CVE-2022-35914POC Details
5Script in Ruby for the CVE-2022-35914 - RCE in GLPI https://github.com/Johnermac/CVE-2022-35914POC Details
6PoC exploit for GLPI - Command injection using a third-party library scripthttps://github.com/allendemoura/CVE-2022-35914POC Details
7𓃌 - htmlLawed 1.2.5 Remote code Executionhttps://github.com/0romos/CVE-2022-35914POC Details
8Modified for GLPI Offsec Lab: call_user_func, array_map, passthruhttps://github.com/noxlumens/CVE-2022-35914_pocPOC Details
9PoC exploit for GLPI - Command injection using a third-party library scripthttps://github.com/senderend/CVE-2022-35914POC Details
10Nonehttps://github.com/btar1gan/exploit_CVE-2022-35914POC Details
11GLPI through 10.0.2 is susceptible to remote command execution injection in /vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-35914.yamlPOC Details
12Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GLPI%20htmLawedTest.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-35914.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-35914
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-35914

No comments yet


Leave a comment