Headline
CVE-2023-29006: RCE from authenticated user
The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the ajax/dropdownContact.php
file from the plugin.
Package
plugin/order (glpi)
Affected versions
>= 1.8.0
Patched versions
2.7.7, 2.10.1
Description
Impact
An authenticated user that has access to standard interface can craft an URL that can be used to execute a system command.
Patches
Upgrade to 2.10.1.
Workarounds
Delete the ajax/dropdownContact.php file from the plugin.
For more information
If you have any questions or comments about this advisory, mail us at [email protected].