CVE-2022-39323: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Time based attack using a SQL injection in api REST user_token. This issue has been patched, please upgrade to version 10.0.4. As a workaround, disable login with user_token on API Rest.
AI Analysis
Technical Summary
CVE-2022-39323 is a medium-severity SQL Injection vulnerability affecting versions of the GLPI software prior to 10.0.4. GLPI (Gestionnaire Libre de Parc Informatique) is an open-source IT asset and service management software widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability resides in the REST API's user_token authentication mechanism, where improper neutralization of special elements in SQL commands allows an attacker to perform time-based SQL injection attacks. This type of injection enables an attacker to execute arbitrary SQL queries by manipulating input parameters that are not properly sanitized, potentially leading to unauthorized data access or modification. The attack vector requires interaction with the API endpoint that handles user_token authentication, and exploitation can be performed remotely without authentication, increasing the risk profile. Although no known exploits have been reported in the wild, the vulnerability's presence in a critical component of IT management infrastructure poses a significant risk. The issue has been addressed in GLPI version 10.0.4, and as a temporary mitigation, disabling login via user_token on the REST API is recommended. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands, a common and dangerous injection flaw that can compromise confidentiality, integrity, and availability of backend databases.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on GLPI for IT asset management and service desk operations. Successful exploitation could allow attackers to extract sensitive information such as user credentials, license data, and audit logs, or even modify or delete critical records, disrupting IT service management processes. This could lead to operational downtime, compliance violations (especially under GDPR due to potential data breaches), and reputational damage. Since GLPI is often integrated with other IT systems, a compromise could serve as a pivot point for further lateral movement within enterprise networks. The time-based nature of the SQL injection may make detection more challenging, potentially allowing prolonged unauthorized access. Although no active exploitation has been reported, the widespread use of GLPI in public and private sectors across Europe, including government agencies and large enterprises, increases the risk of targeted attacks. The vulnerability's exploitation does not require user authentication, which lowers the barrier for attackers and increases the threat surface.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.4 or later is the most effective mitigation, as it contains the official patch addressing the SQL injection flaw. 2. If upgrading is not immediately feasible, disable the user_token login functionality on the REST API to prevent exploitation of the vulnerable endpoint. 3. Implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection patterns targeting the GLPI API endpoints, focusing on time-based injection signatures. 4. Conduct thorough input validation and sanitization on all API inputs, especially those related to authentication tokens, to prevent injection attacks. 5. Monitor API logs for unusual or suspicious activity, such as repeated failed authentication attempts or anomalous query patterns indicative of injection attempts. 6. Restrict API access to trusted networks or VPNs where possible to reduce exposure to external attackers. 7. Perform regular security assessments and penetration testing on GLPI deployments to identify and remediate any residual vulnerabilities. 8. Educate IT staff and administrators about the risks associated with SQL injection and the importance of timely patching and secure configuration.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2022-39323: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Time based attack using a SQL injection in api REST user_token. This issue has been patched, please upgrade to version 10.0.4. As a workaround, disable login with user_token on API Rest.
AI-Powered Analysis
Technical Analysis
CVE-2022-39323 is a medium-severity SQL Injection vulnerability affecting versions of the GLPI software prior to 10.0.4. GLPI (Gestionnaire Libre de Parc Informatique) is an open-source IT asset and service management software widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability resides in the REST API's user_token authentication mechanism, where improper neutralization of special elements in SQL commands allows an attacker to perform time-based SQL injection attacks. This type of injection enables an attacker to execute arbitrary SQL queries by manipulating input parameters that are not properly sanitized, potentially leading to unauthorized data access or modification. The attack vector requires interaction with the API endpoint that handles user_token authentication, and exploitation can be performed remotely without authentication, increasing the risk profile. Although no known exploits have been reported in the wild, the vulnerability's presence in a critical component of IT management infrastructure poses a significant risk. The issue has been addressed in GLPI version 10.0.4, and as a temporary mitigation, disabling login via user_token on the REST API is recommended. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands, a common and dangerous injection flaw that can compromise confidentiality, integrity, and availability of backend databases.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on GLPI for IT asset management and service desk operations. Successful exploitation could allow attackers to extract sensitive information such as user credentials, license data, and audit logs, or even modify or delete critical records, disrupting IT service management processes. This could lead to operational downtime, compliance violations (especially under GDPR due to potential data breaches), and reputational damage. Since GLPI is often integrated with other IT systems, a compromise could serve as a pivot point for further lateral movement within enterprise networks. The time-based nature of the SQL injection may make detection more challenging, potentially allowing prolonged unauthorized access. Although no active exploitation has been reported, the widespread use of GLPI in public and private sectors across Europe, including government agencies and large enterprises, increases the risk of targeted attacks. The vulnerability's exploitation does not require user authentication, which lowers the barrier for attackers and increases the threat surface.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.4 or later is the most effective mitigation, as it contains the official patch addressing the SQL injection flaw. 2. If upgrading is not immediately feasible, disable the user_token login functionality on the REST API to prevent exploitation of the vulnerable endpoint. 3. Implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection patterns targeting the GLPI API endpoints, focusing on time-based injection signatures. 4. Conduct thorough input validation and sanitization on all API inputs, especially those related to authentication tokens, to prevent injection attacks. 5. Monitor API logs for unusual or suspicious activity, such as repeated failed authentication attempts or anomalous query patterns indicative of injection attempts. 6. Restrict API access to trusted networks or VPNs where possible to reduce exposure to external attackers. 7. Perform regular security assessments and penetration testing on GLPI deployments to identify and remediate any residual vulnerabilities. 8. Educate IT staff and administrators about the risks associated with SQL injection and the importance of timely patching and secure configuration.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf489f
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 3:07:13 PM
Last updated: 8/1/2025, 8:19:29 AM
Views: 13
Related Threats
CVE-2025-9097: Improper Export of Android Application Components in Euro Information CIC banque et compte en ligne App
MediumCVE-2025-9096: Cross Site Scripting in ExpressGateway express-gateway
MediumCVE-2025-9095: Cross Site Scripting in ExpressGateway express-gateway
MediumCVE-2025-7342: CWE-798 Use of Hard-coded Credentials in Kubernetes Image Builder
HighCVE-2025-9094: Improper Neutralization of Special Elements Used in a Template Engine in ThingsBoard
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.