mirror of https://github.com/qwqdanchun/Goby.git
69 lines
4.3 KiB
JSON
69 lines
4.3 KiB
JSON
{
|
||
"Name": "GLPI 9.3.3 sqli (CVE-2019-10232)",
|
||
"Description": "<p>Teclib GLPI is a set of IT asset management solutions.</p><p>There are SQL injection vulnerabilities in Teclib GLPI 9.3.3 and earlier versions. A remote attacker can use the ‘cycle’ parameter of the unlock_tasks.php file to use this vulnerability to execute arbitrary SQL commands and obtain sensitive database information.</p>",
|
||
"Product": "GLPI",
|
||
"Homepage": "https://glpi-project.org",
|
||
"DisclosureDate": "2019-11-01",
|
||
"Author": "1291904552@qq.com",
|
||
"FofaQuery": "app=\"TECLIB-GLPI\" || title=\"GLPI\"",
|
||
"GobyQuery": "app=\"TECLIB-GLPI\" || title=\"GLPI\"",
|
||
"Level": "2",
|
||
"Impact": "<p>There are SQL injection vulnerabilities in Teclib GLPI 9.3.3 and earlier versions. A remote attacker can use the ‘cycle’ parameter of the unlock_tasks.php file to use this vulnerability to execute arbitrary SQL commands and obtain sensitive database information.</p>",
|
||
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c\">https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
|
||
"Translation": {
|
||
"CN": {
|
||
"Name": "GLPI 资产管理系统 9.3.3版本 SQL 注入漏洞(CVE-2019-10232)",
|
||
"VulType": ["SQL注入"],
|
||
"Tags": ["SQL注入"],
|
||
"Description": "<p>Teclib GLPI是一套IT资产管理解决方案。</p><p>Teclib GLPI 9.3.3及之前版本中存在SQL注入漏洞。远程攻击者可借助unlock_tasks.php文件的‘cycle’参数利用该漏洞执行任意的SQL命令,获取数据库敏感信息。</p>",
|
||
"Impact": "<p>Teclib GLPI 9.3.3及之前版本中存在SQL注入漏洞。远程攻击者可借助/scripts/unlock_tasks.php文件的‘cycle’参数利用该漏洞执行任意的SQL命令。</p>",
|
||
"Product": "GLPI",
|
||
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新:<a href=\"https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c\">https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c</a></p><p>1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。</p><p>2、如⾮必要,禁⽌公⽹访问该系统。</p>"
|
||
},
|
||
"EN": {
|
||
"Name": "GLPI 9.3.3 sqli (CVE-2019-10232)",
|
||
"VulType": ["sqli"],
|
||
"Tags": ["sqli"],
|
||
"Description": "<p>Teclib GLPI is a set of IT asset management solutions.</p><p>There are SQL injection vulnerabilities in Teclib GLPI 9.3.3 and earlier versions. A remote attacker can use the ‘cycle’ parameter of the unlock_tasks.php file to use this vulnerability to execute arbitrary SQL commands and obtain sensitive database information.</p>",
|
||
"Impact": "<p>There are SQL injection vulnerabilities in Teclib GLPI 9.3.3 and earlier versions. A remote attacker can use the ‘cycle’ parameter of the unlock_tasks.php file to use this vulnerability to execute arbitrary SQL commands and obtain sensitive database information.</p>",
|
||
"Product": "GLPI",
|
||
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c\">https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>"
|
||
}
|
||
},
|
||
"References": [
|
||
"https://nvd.nist.gov/vuln/detail/CVE-2019-10232"
|
||
],
|
||
"HasExp": true,
|
||
"ExpParams": [
|
||
{
|
||
"name": "sqlQuery",
|
||
"type": "input",
|
||
"value": "user()"
|
||
}
|
||
],
|
||
"ExpTips": null,
|
||
"ScanSteps": null,
|
||
"Tags": [
|
||
"sqli"
|
||
],
|
||
"VulType": [
|
||
"sqli"
|
||
],
|
||
"CVEIDs": [
|
||
"CVE-2019-10232"
|
||
],
|
||
"CVSSScore": "9.8",
|
||
"AttackSurfaces": {
|
||
"Application": ["GLPI"],
|
||
"Support": null,
|
||
"Service": null,
|
||
"System": null,
|
||
"Hardware": null
|
||
},
|
||
"CNNVD": [
|
||
"CNNVD-201903-1080"
|
||
],
|
||
"CNVD": [
|
||
""
|
||
]
|
||
} |