Skip to main content

CVE-2022-31068: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in glpi-project glpi

Medium
Published: Tue Jun 28 2022 (06/28/2022, 17:50:11 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade.

AI-Powered Analysis

AILast updated: 06/23/2025, 03:51:25 UTC

Technical Analysis

CVE-2022-31068 is a medium-severity vulnerability affecting the GLPI software, an open-source IT asset and service management solution widely used for data center management, ITIL service desks, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.2. It arises from an unauthenticated feature related to retrieving refused files within the native inventory component of GLPI. Specifically, this feature allows unauthorized actors to access sensitive information without authentication, resulting in an exposure of sensitive data (classified under CWE-200: Exposure of Sensitive Information to an Unauthorized Actor). The flaw essentially permits attackers to bypass access controls and obtain potentially confidential data stored or managed by GLPI instances. Although no known exploits have been reported in the wild, the vulnerability was publicly disclosed on June 28, 2022, and has been addressed in GLPI version 10.0.2. Organizations running affected versions are strongly advised to upgrade to the patched release to mitigate the risk. The vulnerability impacts the confidentiality of sensitive information but does not directly affect system integrity or availability. Exploitation does not require authentication or user interaction, increasing the risk profile for exposed systems. Given GLPI’s role in managing critical IT assets and service operations, unauthorized data exposure could lead to further targeted attacks or data leakage.

Potential Impact

For European organizations, the exposure of sensitive information through this vulnerability could have significant operational and compliance repercussions. GLPI is commonly used by public sector entities, educational institutions, and private enterprises for IT asset management and service desk operations. Unauthorized access to sensitive inventory or service data could reveal internal infrastructure details, license information, or operational workflows, potentially aiding attackers in crafting more sophisticated attacks or causing reputational damage. Additionally, exposure of sensitive data may lead to violations of data protection regulations such as the GDPR, resulting in legal and financial penalties. The impact is particularly critical for organizations managing large-scale IT environments or those with stringent compliance requirements. While the vulnerability does not directly compromise system availability or integrity, the confidentiality breach alone can undermine trust and security posture. The lack of authentication requirement for exploitation increases the risk of automated scanning and mass exploitation attempts, especially if GLPI instances are internet-facing or insufficiently segmented within internal networks.

Mitigation Recommendations

Beyond the essential step of upgrading all affected GLPI instances to version 10.0.2 or later, European organizations should implement several targeted mitigations: 1) Conduct a comprehensive inventory to identify all GLPI deployments, including those in development, testing, and production environments, to ensure no vulnerable instances remain. 2) Restrict network access to GLPI interfaces, especially the native inventory features, by implementing network segmentation, firewall rules, and VPN access controls to limit exposure to trusted users only. 3) Enable and review detailed logging on GLPI servers to detect unusual access patterns or attempts to exploit the unauthenticated file retrieval feature. 4) Perform regular security assessments and penetration tests focusing on GLPI components to identify residual risks or misconfigurations. 5) Educate IT and security teams about this vulnerability and the importance of timely patching and monitoring. 6) If immediate patching is not feasible, consider temporarily disabling or restricting the vulnerable native inventory feature or applying web application firewall (WAF) rules to block unauthorized access to the affected endpoints. 7) Review and tighten access control policies around sensitive IT asset data to minimize the impact of any potential data exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf35e4

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 3:51:25 AM

Last updated: 8/6/2025, 1:07:54 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats