9.1
CVSSv3

CVE-2020-15175

Published: 07/10/2020 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

In GLPI before version 9.5.2, the `?pluginimage.send.php?` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

glpi-project glpi

Github Repositories

GLPI automatic exploitation tool for CVE-2020-15175

GLPwn A GLPI hack tool, using Apache directory listing and / or CVE-2020-15175 to dump files and valid sessions Who is vulnerable? Any GLPI instance that has Apache directory listing already enabled on the /files folder All GLPI instances prior to 951 running on a default Apache2 server What can it do? GLPwn is able to dump all files inside the GLPI /files folder, which i