PT-2011-23: Database information disclosure in GLPI Vulnerable softwareGLPI Version 0.80.1 and earlierApplication link: http://www.glpi-project.org/ Severity levelSeverity level: Medium Impact: Database information disclosure Access Vector: Network exploitable CVSS v2: Base Score: 6.5 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:P)CVE: not assignedSoftware descriptionGLPI is a powerful enterprise ready-to-use suite that allows you to "build your own system" on the fly. It includes a help desk, a knowledge base, a time manager and a reporting system supported by highly configurable and extensible Action & Information Management System. Vulnerability descriptionPositive Research Center has discovered a database information disclosure vulnerability in GLPI. The vulnerability can be exploited with a minimally privileged user account such as "post-only." The vulnerable script is /ajax/autocompletion.php. An authorized user can send a special request to this script and get all usernames registered in the system along with their password hashes. How to fixUpdate your software up to the latest version Update linkAdvisory status11.07.2011 - Vendor is notified 20.07.2011 - Vendor gets vulnerability details 21.07.2011 - Vendor releases fixed version and details 03.08.2011 - Public disclosureCreditsThe vulnerability was detected by Yuri Goltsev, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2011-23Reports on the vulnerabilities previously discovered by Positive Research Center:http://www.ptsecurity.com/advisory1.aspx http://en.securitylab.ru/lab/