Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-27914 PoC — GLPI 跨站脚本漏洞

Source
Associated Vulnerability
Title:GLPI 跨站脚本漏洞 (CVE-2024-27914)
Description:GLPI是个人开发者的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI 10.0.13之前版本存在安全漏洞,该漏洞源于存在反射型跨站脚本(XSS)漏洞,未经身份验证的用户可以向GLPI管理员提供恶意链接。
Readme
# CVE-2024-27914: Reflected XSS in debug mode of GLPI 
---
An unauthenticated user can provide a malicious link to a GLPI administrator in order to exploit a reflected XSS vulnerability. The XSS will only trigger if the administrator navigates through the debug bar.

---
- Package - GLPI (https://github.com/glpi-project/glpi)
- Affected Version - >= 10.0.8
- Patched Version - 10.0.13
---
PoC - `http://<host>/glpi/front/search.php?globalsearch=%3Cscript%3Ealert%281%29%3C%2Fscript%3E`

---
Reference:

 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27914
 - https://nvd.nist.gov/vuln/detail/CVE-2024-27914
File Snapshot

[4.0K] /data/pocs/6a8c45ceecd365f9be1331d92688a00f2ff16a7c └── [ 621] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.