PT-2011-23: Database information disclosure in GLPI
Vulnerable software
GLPI
Version 0.80.1 and earlier
Application link:
http://www.glpi-project.org/
Severity level
Severity level: Medium
Impact: Database information disclosure
Access Vector: Network exploitable
CVSS v2:
Base Score: 6.5
Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVE: not assigned
Software description
GLPI is a powerful enterprise ready-to-use suite that allows you to "build your own system" on the fly. It includes a help desk, a knowledge base, a time manager and a reporting system supported by highly configurable and extensible Action & Information Management System.
Vulnerability description
Positive Research Center has discovered a database information disclosure vulnerability in GLPI.
The vulnerability can be exploited with a minimally privileged user account such as "post-only."
The vulnerable script is /ajax/autocompletion.php. An authorized user can send a special request to this script and get all usernames registered in the system along with their password hashes.
How to fix
Update your software up to the latest version
Update link
Advisory status
11.07.2011 - Vendor is notified
20.07.2011 - Vendor gets vulnerability details
21.07.2011 - Vendor releases fixed version and details
03.08.2011 - Public disclosure
Credits
The vulnerability was detected by Yuri Goltsev, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2011-23
Reports on the vulnerabilities previously discovered by Positive Research Center:
http://www.ptsecurity.com/advisory1.aspx
http://en.securitylab.ru/lab/