Skip to main content

CVE-2022-21720: n/a in n/a

Medium
VulnerabilityCVE-2022-21720cvecve-2022-21720
Published: Fri Jan 28 2022 (01/28/2022, 10:15:14 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.

AI-Powered Analysis

AILast updated: 07/06/2025, 23:25:17 UTC

Technical Analysis

CVE-2022-21720 is a medium-severity SQL injection vulnerability affecting GLPI, a free and open-source asset and IT management software widely used for IT service management. The vulnerability exists in versions prior to 9.5.7 and allows an entity administrator—who normally has restricted privileges limited to their own entity—to retrieve data that should be inaccessible. This is achieved through improper sanitization of input parameters in SQL queries, enabling the attacker to manipulate the query logic and extract sensitive information from the database. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a classic SQL injection flaw. Exploitation does not require user interaction but does require the attacker to have entity administrator privileges, which limits the attack surface to insiders or compromised accounts with elevated rights. The vulnerability does not impact data integrity or availability but compromises confidentiality by exposing sensitive data. The issue was patched in GLPI version 9.5.7, and as a temporary workaround, disabling the 'Entities' update right for entity administrators prevents exploitation. No known exploits are reported in the wild, but the presence of this vulnerability in a widely deployed IT management tool poses a risk if not remediated promptly.

Potential Impact

For European organizations, the impact of CVE-2022-21720 can be significant, especially for those relying on GLPI for IT asset and service management. The ability for an entity administrator to access unauthorized data could lead to exposure of sensitive organizational information, including asset inventories, user data, or configuration details. This could facilitate further attacks such as privilege escalation, targeted phishing, or lateral movement within the network. Confidentiality breaches may also have regulatory implications under GDPR, potentially resulting in legal and financial penalties. Since GLPI is often used in public sector, education, and enterprise environments across Europe, the vulnerability could affect critical infrastructure management and IT operations. However, the requirement for elevated privileges reduces the risk from external attackers but increases the threat from insider misuse or compromised accounts. The lack of impact on integrity and availability means the vulnerability is less likely to cause operational disruption but remains a serious data confidentiality concern.

Mitigation Recommendations

European organizations using GLPI should immediately upgrade to version 9.5.7 or later to apply the official patch addressing CVE-2022-21720. Until the upgrade can be performed, administrators should disable the 'Entities' update right for entity administrators to prevent exploitation. Additionally, organizations should audit entity administrator accounts for suspicious activity and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of account compromise. Regularly reviewing and minimizing privileges assigned to entity administrators can limit the potential attack surface. Network segmentation and monitoring of database queries related to GLPI can help detect anomalous access patterns indicative of exploitation attempts. Finally, organizations should ensure that backups and incident response plans are in place to respond to any potential data breaches resulting from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbe7a

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 11:25:17 PM

Last updated: 8/4/2025, 12:51:24 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats