PT-2011-23: Database information disclosure in GLPI

Vulnerable software

GLPI
Version 0.80.1 and earlier

Application link:
http://www.glpi-project.org/

Severity level

Severity level: Medium    
Impact: Database information disclosure
Access Vector: Network exploitable

CVSS v2:
Base Score: 6.5
Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVE: not assigned

Software description

GLPI is a powerful enterprise ready-to-use suite that allows you to "build your own system" on the fly. It includes a help desk, a knowledge base, a time manager and a reporting system supported by highly configurable and extensible Action & Information Management System.

Vulnerability description

Positive Research Center has discovered a database information disclosure vulnerability in GLPI.
The vulnerability can be exploited with a minimally privileged user account such as "post-only."
The vulnerable script is /ajax/autocompletion.php. An authorized user can send a special request to this script and get all usernames registered in the system along with their password hashes.

How to fix

Update your software up to the latest version
Update link

Advisory status

11.07.2011 - Vendor is notified
20.07.2011 - Vendor gets vulnerability details
21.07.2011 - Vendor releases fixed version and details
03.08.2011 - Public disclosure

Credits

The vulnerability was detected by Yuri Goltsev, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-23

Reports on the vulnerabilities previously discovered by Positive Research Center:

http://www.ptsecurity.com/advisory1.aspx
http://en.securitylab.ru/lab/