Skip to main content

CVE-2022-24868: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi

Medium
Published: Thu Apr 21 2022 (04/21/2022, 16:55:11 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars.

AI-Powered Analysis

AILast updated: 06/23/2025, 10:07:53 UTC

Technical Analysis

CVE-2022-24868 is a medium-severity cross-site scripting (XSS) vulnerability affecting versions of the GLPI (Gestionnaire Libre de Parc Informatique) IT asset and service management software prior to 10.0.0. GLPI is widely used for ITIL service desk functionalities, license tracking, and software auditing. The vulnerability arises from improper sanitization of SVG file uploads used as user avatars. Specifically, the application fails to neutralize malicious JavaScript embedded within SVG files, allowing an attacker to inject script code into the avatar image. When any user views the compromised avatar, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions within the GLPI interface. Exploitation does not require elevated privileges beyond the ability to upload or change an avatar image, which may be restricted to authenticated users depending on the deployment. No known public exploits have been reported in the wild, but the vulnerability presents a significant risk due to the ease of injecting malicious content and the potential for widespread impact on users viewing affected avatars. The vulnerability is categorized under CWE-79, highlighting improper input neutralization during web page generation. Mitigation primarily involves upgrading GLPI to version 10.0.0 or later, where proper sanitization is implemented. For users unable to upgrade promptly, disabling SVG avatars is recommended to prevent exploitation. This vulnerability underscores the importance of rigorous input validation and output encoding for user-supplied content, especially in web applications handling file uploads and user-generated content.

Potential Impact

For European organizations using GLPI versions prior to 10.0.0, this vulnerability could lead to significant security risks including unauthorized access to sensitive IT asset data, service desk tickets, and potentially broader network access if attackers leverage stolen credentials or session tokens. The XSS flaw can facilitate phishing attacks within the GLPI interface, spread malware, or allow attackers to manipulate service desk operations, disrupting IT support workflows. Confidentiality is at risk due to possible data leakage, integrity can be compromised by unauthorized modifications, and availability may be indirectly affected if attackers disrupt service desk functions. Given GLPI's role in IT management, exploitation could cascade into wider organizational impacts, particularly in sectors with critical infrastructure or regulated environments. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target widely used open-source tools. Organizations with multiple GLPI users are at higher risk due to the potential for lateral attack propagation through user interactions.

Mitigation Recommendations

1. Upgrade GLPI installations to version 10.0.0 or later, where the vulnerability is patched with proper SVG sanitization. 2. If upgrading is not immediately feasible, disable the use of SVG files as user avatars to prevent malicious SVG uploads. 3. Implement strict access controls on avatar upload functionality to limit it to trusted users only. 4. Employ web application firewalls (WAFs) with rules to detect and block malicious SVG payloads or suspicious script patterns in file uploads. 5. Conduct regular security audits and penetration testing focused on file upload and user-generated content features. 6. Educate users and administrators about the risks of XSS and encourage vigilance when interacting with user avatars or other dynamic content. 7. Monitor GLPI logs for unusual avatar upload activity or unexpected script execution errors. 8. Consider deploying Content Security Policy (CSP) headers to restrict script execution sources within the GLPI web interface, mitigating impact if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2d30

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 10:07:53 AM

Last updated: 7/31/2025, 3:00:49 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats