Skip to main content

CVE-2022-31061: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi

Medium
Published: Tue Jun 28 2022 (06/28/2022, 17:55:11 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 04:04:55 UTC

Technical Analysis

CVE-2022-31061 is a SQL injection vulnerability identified in the GLPI software, an open-source IT asset and service management platform widely used for data center management, ITIL service desks, license tracking, and software auditing. The vulnerability affects GLPI versions from 9.3.0 up to but not including 9.5.8, and versions from 10.0.0 up to but not including 10.0.2. The flaw resides in the login page, where improper neutralization of special elements in SQL commands allows an attacker to inject malicious SQL code. Notably, exploitation of this vulnerability does not require any user credentials or authentication, making it accessible to unauthenticated remote attackers. This SQL injection could enable attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or even complete compromise of the underlying database. Since the login page is publicly accessible, the attack surface is broad. There are no known workarounds, and users are strongly advised to upgrade to patched versions as soon as possible. Although no known exploits have been reported in the wild, the vulnerability’s presence in a critical component of GLPI’s authentication mechanism poses a significant risk to organizations relying on this software for IT asset and service management.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. GLPI is commonly deployed in public sector institutions, educational organizations, and private enterprises for managing IT assets and service desks. Exploitation could lead to unauthorized access to sensitive IT management data, including asset inventories, license information, and service tickets, potentially exposing confidential operational details. Attackers could also manipulate or delete data, disrupting IT operations and service management workflows. Given that the vulnerability allows unauthenticated access to inject SQL commands, attackers might escalate their privileges or pivot to other internal systems, increasing the risk of broader network compromise. This could result in operational downtime, regulatory compliance violations (especially under GDPR if personal data is involved), and reputational damage. The absence of known exploits currently reduces immediate risk, but the ease of exploitation and critical nature of the affected component make timely remediation essential.

Mitigation Recommendations

Organizations should prioritize upgrading GLPI installations to versions 9.5.8 or later and 10.0.2 or later, where the vulnerability has been addressed. Since no workarounds exist, patching is the primary mitigation. Additionally, organizations should implement network-level protections such as web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the login page. Monitoring and logging of login page access should be enhanced to detect anomalous or suspicious input patterns indicative of injection attempts. Restricting access to the GLPI login interface via IP whitelisting or VPN access can reduce exposure. Regular database backups should be maintained to enable recovery in case of data manipulation. Finally, conducting security assessments and penetration testing focused on GLPI deployments can help identify residual risks and verify the effectiveness of mitigation measures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf35ce

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 4:04:55 AM

Last updated: 8/7/2025, 4:42:13 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats