source: http://www.securityfocus.com/bid/60823/info GLPI is prone to a remote PHP code-execution vulnerability. An attacker can exploit this issue to inject and execute arbitrary PHP code in the context of the affected application. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. GLPI 0.83.9 is vulnerable; other versions may also be affected. An attacker can exploit this issue using a web browser. The following example URI is available: http://www.example.com/glpi/front/ticket.form.php?id=1&_predefined_fields=[XXXX]
Related Exploits
Trying to match CVEs (1): CVE-2013-2225Trying to match OSVDBs (1): 94683
Trying to match setup file: 090511cea4ddd3080bac99340886816a
Other Possible E-DB Search Terms: GLPI 0.83.9, GLPI
Date | D | V | Title | Author |
---|---|---|---|---|
2009-01-29 |
![]() |
GLPI 0.71.3 - Multiple SQL Injections Vulnerabilities | Zigma | |
2015-10-06 |
![]() |
GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution | Raffaele Forte | |
2016-04-29 |
![]() |
GLPi 0.90.2 - SQL Injection | High-Tech B... | |
2013-09-23 |
![]() |
GLPI - 'install.php' Remote Command Execution (Metasploit) | Metasploit | |
2013-06-21 |
![]() |
GLPI 0.83.8 - Multiple Vulnerabilities | LiquidWorm | |
2013-10-02 |
![]() |
GLPI 0.84.1 - Multiple Vulnerabilities | High-Tech B... | |
2014-12-15 |
![]() |
GLPI 0.85 - Blind SQL Injection | Kacper Szurek | |
2017-06-27 |
![]() |
GLPI 0.90.4 - SQL Injection | Eric CARTER |