CVE-2022-31143: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-31143 is a vulnerability classified under CWE-200, indicating the exposure of sensitive information to unauthorized actors within the GLPI software, an open-source IT asset and service management platform widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability affects GLPI versions from 9.5.0 up to, but not including, 10.0.3. Specifically, the flaw allows unauthorized users to access private configuration details such as SMTP server addresses and CAS (Central Authentication Service) hosts. While passwords themselves are not exposed, the disclosure of these configuration parameters can aid attackers in reconnaissance and potentially facilitate further attacks such as phishing, man-in-the-middle, or unauthorized access attempts. The vulnerability arises due to improper access controls or information leakage in the setup configuration interface or API endpoints. No known exploits have been reported in the wild, and no workarounds exist other than upgrading to version 10.0.3 or later, where the issue has been addressed. The vulnerability does not require authentication or user interaction, increasing its risk profile. However, the impact is limited to information disclosure without direct compromise of credentials or system integrity.
Potential Impact
For European organizations, the exposure of GLPI configuration details can have several implications. GLPI is commonly deployed in IT departments across various sectors including government, education, healthcare, and private enterprises. Disclosure of SMTP and CAS host information can enable attackers to craft targeted phishing campaigns or attempt to intercept authentication traffic, potentially leading to credential theft or unauthorized access. While passwords are not directly exposed, the leaked infrastructure details reduce the attacker's effort in mapping the network environment and identifying critical services. This can increase the likelihood of successful social engineering or lateral movement attacks. Organizations relying heavily on GLPI for IT asset management and service desk operations may face operational disruptions if attackers leverage this information for further exploitation. Additionally, regulatory compliance frameworks such as GDPR emphasize the protection of sensitive information, and exposure of internal infrastructure details could be viewed as a compliance risk, potentially leading to reputational damage or regulatory scrutiny.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade GLPI installations to version 10.0.3 or later, where the vulnerability has been fixed. Organizations should prioritize patching affected systems promptly. Beyond upgrading, administrators should audit access controls to ensure that configuration interfaces and APIs are not publicly accessible or exposed to unauthorized users. Implement network segmentation and firewall rules to restrict access to GLPI management interfaces to trusted internal networks or VPNs. Monitoring and logging access to GLPI configuration endpoints can help detect unauthorized access attempts. Additionally, organizations should review and harden their email and authentication infrastructure, including enforcing strong TLS configurations on SMTP servers and CAS services, to mitigate risks arising from exposed host information. Employee awareness training on phishing risks should be reinforced, given the increased potential for targeted attacks leveraging leaked infrastructure details.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain, Poland, Sweden, Finland
CVE-2022-31143: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-31143 is a vulnerability classified under CWE-200, indicating the exposure of sensitive information to unauthorized actors within the GLPI software, an open-source IT asset and service management platform widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability affects GLPI versions from 9.5.0 up to, but not including, 10.0.3. Specifically, the flaw allows unauthorized users to access private configuration details such as SMTP server addresses and CAS (Central Authentication Service) hosts. While passwords themselves are not exposed, the disclosure of these configuration parameters can aid attackers in reconnaissance and potentially facilitate further attacks such as phishing, man-in-the-middle, or unauthorized access attempts. The vulnerability arises due to improper access controls or information leakage in the setup configuration interface or API endpoints. No known exploits have been reported in the wild, and no workarounds exist other than upgrading to version 10.0.3 or later, where the issue has been addressed. The vulnerability does not require authentication or user interaction, increasing its risk profile. However, the impact is limited to information disclosure without direct compromise of credentials or system integrity.
Potential Impact
For European organizations, the exposure of GLPI configuration details can have several implications. GLPI is commonly deployed in IT departments across various sectors including government, education, healthcare, and private enterprises. Disclosure of SMTP and CAS host information can enable attackers to craft targeted phishing campaigns or attempt to intercept authentication traffic, potentially leading to credential theft or unauthorized access. While passwords are not directly exposed, the leaked infrastructure details reduce the attacker's effort in mapping the network environment and identifying critical services. This can increase the likelihood of successful social engineering or lateral movement attacks. Organizations relying heavily on GLPI for IT asset management and service desk operations may face operational disruptions if attackers leverage this information for further exploitation. Additionally, regulatory compliance frameworks such as GDPR emphasize the protection of sensitive information, and exposure of internal infrastructure details could be viewed as a compliance risk, potentially leading to reputational damage or regulatory scrutiny.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade GLPI installations to version 10.0.3 or later, where the vulnerability has been fixed. Organizations should prioritize patching affected systems promptly. Beyond upgrading, administrators should audit access controls to ensure that configuration interfaces and APIs are not publicly accessible or exposed to unauthorized users. Implement network segmentation and firewall rules to restrict access to GLPI management interfaces to trusted internal networks or VPNs. Monitoring and logging access to GLPI configuration endpoints can help detect unauthorized access attempts. Additionally, organizations should review and harden their email and authentication infrastructure, including enforcing strong TLS configurations on SMTP servers and CAS services, to mitigate risks arising from exposed host information. Employee awareness training on phishing risks should be reinforced, given the increased potential for targeted attacks leveraging leaked infrastructure details.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3cec
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 10:50:25 PM
Last updated: 8/11/2025, 6:52:30 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.