Skip to main content

CVE-2022-35946: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi

Medium
Published: Wed Sep 14 2022 (09/14/2022, 17:55:09 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have "General setup" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script.

AI-Powered Analysis

AILast updated: 06/22/2025, 22:36:49 UTC

Technical Analysis

CVE-2022-35946 is a medium-severity SQL Injection vulnerability affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, an open-source IT asset and service management solution widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability exists in the plugin controller of GLPI versions from 0.72 up to, but not including, 10.0.3. Specifically, the issue arises because user input in requests is not properly sanitized or validated before being used in SQL commands within the plugin controller. This improper neutralization of special elements (CWE-89) allows an attacker with "General setup" update rights to manipulate SQL queries, potentially altering database contents. The attack vector requires authenticated access with elevated privileges, meaning the attacker must already have some level of administrative rights within the GLPI environment. Exploitation could lead to unauthorized modification of critical data stored in the GLPI database, such as asset records, service tickets, or configuration information, undermining data integrity and potentially impacting IT service management operations. No known exploits have been reported in the wild to date. The vendor recommends upgrading to GLPI version 10.0.3 or later to remediate the vulnerability. For users unable to upgrade immediately, a temporary mitigation is to remove the vulnerable script file `front/plugin.form.php` to prevent exploitation through this attack vector.

Potential Impact

For European organizations relying on GLPI for IT asset management and service desk operations, this vulnerability poses a risk to the integrity of critical IT management data. An attacker exploiting this flaw could alter database records, potentially disrupting IT service workflows, misrepresenting asset inventories, or corrupting license tracking data. This could lead to operational inefficiencies, compliance issues, and increased risk of further security incidents due to inaccurate IT environment visibility. Since exploitation requires authenticated access with elevated privileges, the threat is primarily from insider threats or attackers who have already compromised lower-level accounts. However, if such access is obtained, the impact on confidentiality is limited but the integrity and availability of IT management data could be significantly affected. This may also indirectly affect business continuity and regulatory compliance, especially in sectors with strict IT governance requirements such as finance, healthcare, and critical infrastructure within Europe.

Mitigation Recommendations

1. Immediate upgrade to GLPI version 10.0.3 or later, which contains the fix for this vulnerability, is the most effective mitigation. 2. For organizations unable to upgrade promptly, remove or restrict access to the `front/plugin.form.php` script to block the vulnerable entry point. 3. Review and tighten user permissions to ensure that only trusted administrators have "General setup" update rights, minimizing the risk of privilege abuse. 4. Implement strong authentication mechanisms and monitor administrative account activities for unusual behavior indicative of compromise. 5. Conduct regular audits of GLPI database integrity and logs to detect unauthorized changes early. 6. Employ network segmentation and access controls to limit exposure of GLPI management interfaces to trusted internal networks only. 7. Maintain up-to-date backups of GLPI data to enable recovery in case of data corruption or tampering. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting GLPI plugin endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3d26

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 10:36:49 PM

Last updated: 7/30/2025, 11:24:40 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats