6.5
CVSSv2

CVE-2019-14666

Published: 25/09/2019 Updated: 24/08/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

GLPI up to and including 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

glpi-project glpi

Github Repositories

GLPI-943-Account-Takeover Discovery and original PoC made by Pablo Martinez just adjusted slightly for python3 Example python3 resetpy --url localhost/ --user normal --password normal --email glpi_adm@testcom --newpass test Sofware: GLPI Version: <= 943 Discovered by: Pablo Martinez (@Xassiz) Fix: version 944 Vulnerability: Account takeover (CVE-2019-14666