CVE-2013-5696

CVSS V2 Medium 6.8 CVSS V3 None
Description
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
Overview
  • CVE ID
  • CVE-2013-5696
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2013-09-23T03:49:27
  • Last Modified Date
  • 2013-09-23T22:33:16
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* 1 OR 0.84.1
cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.40:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.41:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.83.91:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:glpi-project:glpi:0.84:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
History
Created Old Value New Value Data Type Notes
2022-05-10 10:42:31 Added to TrackCVE
2022-12-01 19:49:31 2013-09-23T03:49Z 2013-09-23T03:49:27 CVE Published Date updated
2022-12-01 19:49:31 2013-09-23T22:33:16 CVE Modified Date updated
2022-12-01 19:49:31 Analyzed Vulnerability Status updated