Skip to main content

CVE-2022-31056: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi

Medium
Published: Tue Jun 28 2022 (06/28/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.

AI-Powered Analysis

AILast updated: 06/23/2025, 04:05:36 UTC

Technical Analysis

CVE-2022-31056 is a medium-severity SQL Injection vulnerability (CWE-89) affecting the GLPI software, an open-source IT asset and service management platform widely used for data center management, ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.2, specifically in all assistance forms such as Ticket, Change, and Problem forms. These forms improperly neutralize special elements in the 'actor' fields, allowing an attacker to inject malicious SQL commands. This improper input sanitization can lead to unauthorized database queries, potentially exposing sensitive information, modifying data, or disrupting service availability. The issue was addressed and fixed in GLPI version 10.0.2. No known exploits have been reported in the wild as of the published date, but the vulnerability presents a significant risk if left unpatched, especially given GLPI's role in managing critical IT infrastructure and service workflows.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial due to GLPI's adoption in various sectors including government agencies, healthcare, education, and private enterprises managing complex IT environments. Exploitation could lead to unauthorized access to sensitive asset and service management data, including user credentials, configuration details, and operational tickets. This could compromise confidentiality and integrity of IT management processes, potentially enabling further lateral movement within networks or disruption of IT service management workflows. The availability of ITIL service desks could also be affected if attackers manipulate or delete critical records. Given the central role GLPI plays in IT operations, exploitation could degrade organizational response capabilities and increase downtime, impacting business continuity and regulatory compliance, particularly under GDPR requirements for data protection.

Mitigation Recommendations

Organizations should immediately verify their GLPI version and upgrade to version 10.0.2 or later to remediate this vulnerability. Beyond patching, it is recommended to audit all input validation mechanisms in GLPI customizations or integrations to ensure no residual injection vectors remain. Implementing Web Application Firewalls (WAF) with SQL injection detection rules tailored to GLPI's request patterns can provide additional protection. Regularly review and restrict database user privileges used by GLPI to minimize potential damage from injection attacks. Conduct thorough logging and monitoring of GLPI application logs and database queries to detect anomalous activities indicative of exploitation attempts. Finally, organizations should perform security awareness training for administrators managing GLPI to recognize and respond to suspicious behavior promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf35b5

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 4:05:36 AM

Last updated: 8/1/2025, 12:45:25 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats