8.8
CVSSv3

CVE-2020-11060

Published: 12/05/2020 Updated: 04/11/2021
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

In GLPI prior to 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

glpi-project glpi

Exploits

GLPI GZIP(Py3) version 945 suffers from a remote code execution vulnerability ...
GLPI version 945 remote code execution exploit ...

Github Repositories

Python3 POC for CVE 2020-11060

CVE-2020-11060 This script is a Python 3x based exploit for CVE-2020-11060 in GLPI versions 085-945 Original implementation: 0xdreadnaught Python3 refactoring: n3rada The original PoC in ExploitDB is now deprecated since it used Python 2x The new version has been submitted, and a link will be added here if/when it's accepted The original vulnerability research used

glpi_cve-2020-11060 对存在CVE-2020-11060的站点进行攻击 Poc目录结构 Pocpy :攻击脚本 crcChanger : 用于构造特定crc的文件,在Pocpy中被调用 payload payload : 拥有一块不被压缩的phpwebshell,用于攻击的最后步骤 a : 动态生成,根据数据库dump的结果,生成相应的a文件,起到打开<?=/*的作用 t