2022-06-08 08:10:34 +00:00
id : CVE-2021-39211
info :
2023-02-01 17:58:20 +00:00
name : GLPI 9.2/<9.5.6 - Information Disclosure
2022-06-08 08:10:34 +00:00
author : dogasantos,noraj
severity : medium
2023-02-01 17:58:20 +00:00
description : GLPI 9.2 and prior to 9.5.6 is susceptible to information disclosure via the telemetry endpoint, which discloses GLPI and server information. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
2022-06-08 08:10:34 +00:00
reference :
- https://github.com/glpi-project/glpi/security/advisories/GHSA-xx66-v3g5-w825
2022-06-08 12:17:33 +00:00
- https://github.com/glpi-project/glpi/releases/tag/9.5.6
2023-02-01 17:58:20 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-39211
remediation : This issue is fixed in version 9.5.6. As a workaround, remove the file ajax/telemetry.php, which is not needed for usual GLPI functions.
2022-06-08 08:10:34 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score : 5.3
cve-id : CVE-2021-39211
cwe-id : CWE-668,CWE-200
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
epss-score : 0.00253
2022-06-08 08:10:34 +00:00
tags : cve,cve2021,glpi,exposure
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2022-06-08 08:10:34 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-06-08 08:10:34 +00:00
- method : GET
path :
- "{{BaseURL}}/ajax/telemetry.php"
- "{{BaseURL}}/glpi/ajax/telemetry.php"
matchers-condition : and
matchers :
- type : word
words :
- '"uuid":'
- '"glpi":'
condition : and
- type : status
status :
- 200