Skip to the content.

DIVD-2023-00016 - GLPI Remote Code Execution

Our reference DIVD-2023-00016
Case lead Josha Beekman
Author Finn van der Knaap en Josha Beekman
Researcher(s)
CVE(s)
Product GLPI
Versions
  • < 9.5.9
  • < 10.0.3
Recommendation Update to the latest version
Workaround Delete the vendor/htmlawed/htmlawed/htmLawedTest.php file, (be careful not to touch the htmLawed.php file which is legitimate).
Status Closed
Last modified 25 May 2023 22:15 CEST

Summary

On September 14, 2022, a new 0-day vulnerability came out in GLPI and was posted online. GLPI is an open source IT asset management software which is widely used. The vulnerability involves a code injection in GLPI instances versions < 10.0.3 and < 9.5.9 which results in a remote code execution vulnerability, caused by an old version of the htmlawed library (under /vendor/htmlawed/htmlawed/) that still contains the htmLawedTest.php file with code injection vulnerability.

What you can do

What we are doing

Timeline

Date Description
10 Dec 2022-
16 Dec 2022
Started research
16 Dec 2022-
17 Dec 2022
Nuclei template made
19 Dec 2022-
04 Mar 2023
Started scanning for vulnerable instances
16 Mar 2023 First mail round sent
16 Mar 2023 Case file posted
09 May 2023 Second scan for vulnerable instances
10 May 2023 Second mail round
25 May 2023 Case closed
gantt title DIVD-2023-00016 - GLPI Remote Code Execution dateFormat YYYY-MM-DD axisFormat %e %b %Y section Case DIVD-2023-00016 - GLPI Remote Code Execution (196 days) :2022-11-10, 2023-05-25 section Events Started research (6 days) : 2022-12-10, 2022-12-16 Nuclei template made (1 days) : 2022-12-16, 2022-12-17 Started scanning for vulnerable instances (75 days) : 2022-12-19, 2023-03-04 First mail round sent : milestone, 2023-03-16, 0d Case file posted : milestone, 2023-03-16, 0d Second scan for vulnerable instances : milestone, 2023-05-09, 0d Second mail round : milestone, 2023-05-10, 0d Case closed : milestone, 2023-05-25, 0d

More information