Skip to main content

CVE-2022-39370: CWE-284: Improper Access Control in glpi-project glpi

Medium
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Connected users may gain access to debug panel through the GLPI update script. This issue has been patched, please upgrade to 10.0.4. As a workaround, delete the `install/update.php` script.

AI-Powered Analysis

AILast updated: 06/22/2025, 14:36:49 UTC

Technical Analysis

CVE-2022-39370 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the GLPI software, a widely used free and open-source IT asset and service management platform. GLPI provides ITIL-compliant service desk features, license tracking, and software auditing, making it a critical tool for IT operations in many organizations. The vulnerability exists in versions of GLPI from 0.70 up to, but not including, 10.0.4. Specifically, the issue allows authenticated users to access the debug panel through the GLPI update script located at 'install/update.php'. This access is unintended and bypasses proper access control mechanisms, potentially exposing sensitive debugging information or administrative functionalities that should be restricted. The vulnerability arises because the update script does not adequately verify user permissions before granting access to the debug panel. Although exploitation requires the user to be authenticated, the improper access control could lead to privilege escalation or unauthorized information disclosure within the GLPI environment. The vendor has addressed this vulnerability in version 10.0.4 by correcting the access control checks. As an immediate mitigation, it is recommended to delete the 'install/update.php' script if upgrading is not immediately feasible. There are no known exploits in the wild reported for this vulnerability as of the publication date. The vulnerability was publicly disclosed on November 3, 2022, and has been enriched by CISA, indicating its recognition by cybersecurity authorities.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying heavily on GLPI for IT asset management and service desk operations. Unauthorized access to the debug panel could allow malicious insiders or compromised accounts to gain insights into the system's internal workings, potentially leading to further exploitation such as privilege escalation, data leakage, or disruption of IT service management processes. This could affect confidentiality by exposing sensitive configuration or debugging data, integrity by enabling unauthorized changes to system settings, and availability if attackers manipulate the update process or debug functions to disrupt service. Given GLPI's role in managing IT assets and licenses, exploitation could also lead to compliance issues or operational downtime. The requirement for authentication limits the attack surface to internal or trusted users, but insider threats or compromised credentials remain a realistic risk. The absence of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in environments where GLPI is widely deployed.

Mitigation Recommendations

1. Immediate Upgrade: Organizations should prioritize upgrading GLPI installations to version 10.0.4 or later, where the vulnerability is patched. 2. Remove Vulnerable Script: As a temporary workaround, delete or restrict access to the 'install/update.php' script to prevent access to the debug panel. 3. Access Controls Review: Conduct a thorough review of user permissions within GLPI to ensure that only trusted users have authenticated access, minimizing the risk of insider exploitation. 4. Network Segmentation: Restrict access to GLPI interfaces to trusted network segments and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 5. Monitoring and Logging: Enable detailed logging of access to GLPI update scripts and debug panels, and monitor for unusual access patterns that could indicate exploitation attempts. 6. Incident Response Preparedness: Prepare incident response plans specific to GLPI compromise scenarios, including steps to revoke credentials and restore system integrity. 7. Vendor Communication: Stay informed about any further patches or advisories from the GLPI project and apply updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf4999

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 2:36:49 PM

Last updated: 8/18/2025, 11:30:44 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats