Skip to main content

CVE-2022-31143: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in glpi-project glpi

Medium
Published: Wed Sep 14 2022 (09/14/2022, 17:40:09 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 22:50:25 UTC

Technical Analysis

CVE-2022-31143 is a vulnerability classified under CWE-200, indicating the exposure of sensitive information to unauthorized actors within the GLPI software, an open-source IT asset and service management platform widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability affects GLPI versions from 9.5.0 up to, but not including, 10.0.3. Specifically, the flaw allows unauthorized users to access private configuration details such as SMTP server addresses and CAS (Central Authentication Service) hosts. While passwords themselves are not exposed, the disclosure of these configuration parameters can aid attackers in reconnaissance and potentially facilitate further attacks such as phishing, man-in-the-middle, or unauthorized access attempts. The vulnerability arises due to improper access controls or information leakage in the setup configuration interface or API endpoints. No known exploits have been reported in the wild, and no workarounds exist other than upgrading to version 10.0.3 or later, where the issue has been addressed. The vulnerability does not require authentication or user interaction, increasing its risk profile. However, the impact is limited to information disclosure without direct compromise of credentials or system integrity.

Potential Impact

For European organizations, the exposure of GLPI configuration details can have several implications. GLPI is commonly deployed in IT departments across various sectors including government, education, healthcare, and private enterprises. Disclosure of SMTP and CAS host information can enable attackers to craft targeted phishing campaigns or attempt to intercept authentication traffic, potentially leading to credential theft or unauthorized access. While passwords are not directly exposed, the leaked infrastructure details reduce the attacker's effort in mapping the network environment and identifying critical services. This can increase the likelihood of successful social engineering or lateral movement attacks. Organizations relying heavily on GLPI for IT asset management and service desk operations may face operational disruptions if attackers leverage this information for further exploitation. Additionally, regulatory compliance frameworks such as GDPR emphasize the protection of sensitive information, and exposure of internal infrastructure details could be viewed as a compliance risk, potentially leading to reputational damage or regulatory scrutiny.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade GLPI installations to version 10.0.3 or later, where the vulnerability has been fixed. Organizations should prioritize patching affected systems promptly. Beyond upgrading, administrators should audit access controls to ensure that configuration interfaces and APIs are not publicly accessible or exposed to unauthorized users. Implement network segmentation and firewall rules to restrict access to GLPI management interfaces to trusted internal networks or VPNs. Monitoring and logging access to GLPI configuration endpoints can help detect unauthorized access attempts. Additionally, organizations should review and harden their email and authentication infrastructure, including enforcing strong TLS configurations on SMTP servers and CAS services, to mitigate risks arising from exposed host information. Employee awareness training on phishing risks should be reinforced, given the increased potential for targeted attacks leveraging leaked infrastructure details.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3cec

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 10:50:25 PM

Last updated: 8/11/2025, 6:52:30 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats