DIVD-2023-00016 - GLPI Remote Code Execution
Our reference | DIVD-2023-00016 |
Case lead | Josha Beekman |
Author | Finn van der Knaap en Josha Beekman |
Researcher(s) | |
CVE(s) | |
Product | GLPI |
Versions |
|
Recommendation | Update to the latest version |
Workaround | Delete the vendor/htmlawed/htmlawed/htmLawedTest.php file, (be careful not to touch the htmLawed.php file which is legitimate). |
Status | Closed |
Last modified | 25 May 2023 22:15 CEST |
Summary
On September 14, 2022, a new 0-day vulnerability came out in GLPI and was posted online. GLPI is an open source IT asset management software which is widely used. The vulnerability involves a code injection in GLPI instances versions < 10.0.3 and < 9.5.9 which results in a remote code execution vulnerability, caused by an old version of the htmlawed library (under /vendor/htmlawed/htmlawed/) that still contains the htmLawedTest.php file with code injection vulnerability.
What you can do
- Consider upgrading to the latest version.
- Delete the vendor/htmlawed/htmlawed/htmLawedTest.php file (be careful not to touch the htmLawed.php file which is legitimate). Or prevent web access to the vendor/ folder by setting (in the case of Apache, for example) an adequate .htaccess.
What we are doing
- DIVD is currently pin-pointing, all the vulnerable GLPI servers.
- DIVD is investigating if we can start informing the owners of vulnerable GLPI servers.
- DIVD started scanning for vulnerable instances.
Timeline
Date | Description |
---|---|
10 Dec 2022- 16 Dec 2022 |
Started research |
16 Dec 2022- 17 Dec 2022 |
Nuclei template made |
19 Dec 2022- 04 Mar 2023 |
Started scanning for vulnerable instances |
16 Mar 2023 | First mail round sent |
16 Mar 2023 | Case file posted |
09 May 2023 | Second scan for vulnerable instances |
10 May 2023 | Second mail round |
25 May 2023 | Case closed |
gantt
title DIVD-2023-00016 - GLPI Remote Code Execution
dateFormat YYYY-MM-DD
axisFormat %e %b %Y
section Case
DIVD-2023-00016 - GLPI Remote Code Execution (196 days) :2022-11-10, 2023-05-25
section Events
Started research (6 days) : 2022-12-10, 2022-12-16
Nuclei template made (1 days) : 2022-12-16, 2022-12-17
Started scanning for vulnerable instances (75 days) : 2022-12-19, 2023-03-04
First mail round sent : milestone, 2023-03-16, 0d
Case file posted : milestone, 2023-03-16, 0d
Second scan for vulnerable instances : milestone, 2023-05-09, 0d
Second mail round : milestone, 2023-05-10, 0d
Case closed : milestone, 2023-05-25, 0d