CVE-2022-39370: CWE-284: Improper Access Control in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Connected users may gain access to debug panel through the GLPI update script. This issue has been patched, please upgrade to 10.0.4. As a workaround, delete the `install/update.php` script.
AI Analysis
Technical Summary
CVE-2022-39370 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the GLPI software, a widely used free and open-source IT asset and service management platform. GLPI provides ITIL-compliant service desk features, license tracking, and software auditing, making it a critical tool for IT operations in many organizations. The vulnerability exists in versions of GLPI from 0.70 up to, but not including, 10.0.4. Specifically, the issue allows authenticated users to access the debug panel through the GLPI update script located at 'install/update.php'. This access is unintended and bypasses proper access control mechanisms, potentially exposing sensitive debugging information or administrative functionalities that should be restricted. The vulnerability arises because the update script does not adequately verify user permissions before granting access to the debug panel. Although exploitation requires the user to be authenticated, the improper access control could lead to privilege escalation or unauthorized information disclosure within the GLPI environment. The vendor has addressed this vulnerability in version 10.0.4 by correcting the access control checks. As an immediate mitigation, it is recommended to delete the 'install/update.php' script if upgrading is not immediately feasible. There are no known exploits in the wild reported for this vulnerability as of the publication date. The vulnerability was publicly disclosed on November 3, 2022, and has been enriched by CISA, indicating its recognition by cybersecurity authorities.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying heavily on GLPI for IT asset management and service desk operations. Unauthorized access to the debug panel could allow malicious insiders or compromised accounts to gain insights into the system's internal workings, potentially leading to further exploitation such as privilege escalation, data leakage, or disruption of IT service management processes. This could affect confidentiality by exposing sensitive configuration or debugging data, integrity by enabling unauthorized changes to system settings, and availability if attackers manipulate the update process or debug functions to disrupt service. Given GLPI's role in managing IT assets and licenses, exploitation could also lead to compliance issues or operational downtime. The requirement for authentication limits the attack surface to internal or trusted users, but insider threats or compromised credentials remain a realistic risk. The absence of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in environments where GLPI is widely deployed.
Mitigation Recommendations
1. Immediate Upgrade: Organizations should prioritize upgrading GLPI installations to version 10.0.4 or later, where the vulnerability is patched. 2. Remove Vulnerable Script: As a temporary workaround, delete or restrict access to the 'install/update.php' script to prevent access to the debug panel. 3. Access Controls Review: Conduct a thorough review of user permissions within GLPI to ensure that only trusted users have authenticated access, minimizing the risk of insider exploitation. 4. Network Segmentation: Restrict access to GLPI interfaces to trusted network segments and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 5. Monitoring and Logging: Enable detailed logging of access to GLPI update scripts and debug panels, and monitor for unusual access patterns that could indicate exploitation attempts. 6. Incident Response Preparedness: Prepare incident response plans specific to GLPI compromise scenarios, including steps to revoke credentials and restore system integrity. 7. Vendor Communication: Stay informed about any further patches or advisories from the GLPI project and apply updates promptly.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2022-39370: CWE-284: Improper Access Control in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Connected users may gain access to debug panel through the GLPI update script. This issue has been patched, please upgrade to 10.0.4. As a workaround, delete the `install/update.php` script.
AI-Powered Analysis
Technical Analysis
CVE-2022-39370 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the GLPI software, a widely used free and open-source IT asset and service management platform. GLPI provides ITIL-compliant service desk features, license tracking, and software auditing, making it a critical tool for IT operations in many organizations. The vulnerability exists in versions of GLPI from 0.70 up to, but not including, 10.0.4. Specifically, the issue allows authenticated users to access the debug panel through the GLPI update script located at 'install/update.php'. This access is unintended and bypasses proper access control mechanisms, potentially exposing sensitive debugging information or administrative functionalities that should be restricted. The vulnerability arises because the update script does not adequately verify user permissions before granting access to the debug panel. Although exploitation requires the user to be authenticated, the improper access control could lead to privilege escalation or unauthorized information disclosure within the GLPI environment. The vendor has addressed this vulnerability in version 10.0.4 by correcting the access control checks. As an immediate mitigation, it is recommended to delete the 'install/update.php' script if upgrading is not immediately feasible. There are no known exploits in the wild reported for this vulnerability as of the publication date. The vulnerability was publicly disclosed on November 3, 2022, and has been enriched by CISA, indicating its recognition by cybersecurity authorities.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying heavily on GLPI for IT asset management and service desk operations. Unauthorized access to the debug panel could allow malicious insiders or compromised accounts to gain insights into the system's internal workings, potentially leading to further exploitation such as privilege escalation, data leakage, or disruption of IT service management processes. This could affect confidentiality by exposing sensitive configuration or debugging data, integrity by enabling unauthorized changes to system settings, and availability if attackers manipulate the update process or debug functions to disrupt service. Given GLPI's role in managing IT assets and licenses, exploitation could also lead to compliance issues or operational downtime. The requirement for authentication limits the attack surface to internal or trusted users, but insider threats or compromised credentials remain a realistic risk. The absence of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in environments where GLPI is widely deployed.
Mitigation Recommendations
1. Immediate Upgrade: Organizations should prioritize upgrading GLPI installations to version 10.0.4 or later, where the vulnerability is patched. 2. Remove Vulnerable Script: As a temporary workaround, delete or restrict access to the 'install/update.php' script to prevent access to the debug panel. 3. Access Controls Review: Conduct a thorough review of user permissions within GLPI to ensure that only trusted users have authenticated access, minimizing the risk of insider exploitation. 4. Network Segmentation: Restrict access to GLPI interfaces to trusted network segments and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 5. Monitoring and Logging: Enable detailed logging of access to GLPI update scripts and debug panels, and monitor for unusual access patterns that could indicate exploitation attempts. 6. Incident Response Preparedness: Prepare incident response plans specific to GLPI compromise scenarios, including steps to revoke credentials and restore system integrity. 7. Vendor Communication: Stay informed about any further patches or advisories from the GLPI project and apply updates promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4999
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 2:36:49 PM
Last updated: 8/18/2025, 11:30:44 PM
Views: 14
Related Threats
CVE-2025-9233: Cross Site Scripting in Scada-LTS
MediumCVE-2025-55751: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in HackUCF OnboardLite
MediumCVE-2025-50864: n/a
HighCVE-2025-51991: n/a
HighCVE-2025-51990: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.