Skip to main content

CVE-2022-39323: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi

Medium
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Time based attack using a SQL injection in api REST user_token. This issue has been patched, please upgrade to version 10.0.4. As a workaround, disable login with user_token on API Rest.

AI-Powered Analysis

AILast updated: 06/22/2025, 15:07:13 UTC

Technical Analysis

CVE-2022-39323 is a medium-severity SQL Injection vulnerability affecting versions of the GLPI software prior to 10.0.4. GLPI (Gestionnaire Libre de Parc Informatique) is an open-source IT asset and service management software widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability resides in the REST API's user_token authentication mechanism, where improper neutralization of special elements in SQL commands allows an attacker to perform time-based SQL injection attacks. This type of injection enables an attacker to execute arbitrary SQL queries by manipulating input parameters that are not properly sanitized, potentially leading to unauthorized data access or modification. The attack vector requires interaction with the API endpoint that handles user_token authentication, and exploitation can be performed remotely without authentication, increasing the risk profile. Although no known exploits have been reported in the wild, the vulnerability's presence in a critical component of IT management infrastructure poses a significant risk. The issue has been addressed in GLPI version 10.0.4, and as a temporary mitigation, disabling login via user_token on the REST API is recommended. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands, a common and dangerous injection flaw that can compromise confidentiality, integrity, and availability of backend databases.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on GLPI for IT asset management and service desk operations. Successful exploitation could allow attackers to extract sensitive information such as user credentials, license data, and audit logs, or even modify or delete critical records, disrupting IT service management processes. This could lead to operational downtime, compliance violations (especially under GDPR due to potential data breaches), and reputational damage. Since GLPI is often integrated with other IT systems, a compromise could serve as a pivot point for further lateral movement within enterprise networks. The time-based nature of the SQL injection may make detection more challenging, potentially allowing prolonged unauthorized access. Although no active exploitation has been reported, the widespread use of GLPI in public and private sectors across Europe, including government agencies and large enterprises, increases the risk of targeted attacks. The vulnerability's exploitation does not require user authentication, which lowers the barrier for attackers and increases the threat surface.

Mitigation Recommendations

1. Immediate upgrade to GLPI version 10.0.4 or later is the most effective mitigation, as it contains the official patch addressing the SQL injection flaw. 2. If upgrading is not immediately feasible, disable the user_token login functionality on the REST API to prevent exploitation of the vulnerable endpoint. 3. Implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection patterns targeting the GLPI API endpoints, focusing on time-based injection signatures. 4. Conduct thorough input validation and sanitization on all API inputs, especially those related to authentication tokens, to prevent injection attacks. 5. Monitor API logs for unusual or suspicious activity, such as repeated failed authentication attempts or anomalous query patterns indicative of injection attempts. 6. Restrict API access to trusted networks or VPNs where possible to reduce exposure to external attackers. 7. Perform regular security assessments and penetration testing on GLPI deployments to identify and remediate any residual vulnerabilities. 8. Educate IT staff and administrators about the risks associated with SQL injection and the importance of timely patching and secure configuration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf489f

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 3:07:13 PM

Last updated: 8/1/2025, 8:19:29 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats