Skip to main content

CVE-2022-39373: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi

Medium
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, please upgrade to version 10.0.4.

AI-Powered Analysis

AILast updated: 06/22/2025, 14:36:10 UTC

Technical Analysis

CVE-2022-39373 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.4. Specifically, the flaw arises from improper neutralization of input during web page generation, where an administrator can store malicious code within the entity name field. This malicious input is not adequately sanitized or encoded before being rendered in the web interface, enabling the injection and execution of arbitrary JavaScript code in the context of users viewing the affected pages. Exploiting this vulnerability could allow an attacker with administrative privileges to execute scripts that may hijack user sessions, steal sensitive information, or perform actions on behalf of other users. Although exploitation requires administrative access to inject the malicious payload, the vulnerability poses a risk to the confidentiality and integrity of data managed within GLPI. The issue has been addressed in GLPI version 10.0.4, and users are advised to upgrade to this or later versions to mitigate the risk. There are no known exploits in the wild at this time, but the presence of this vulnerability in an IT management platform used by organizations makes it a potential target for attackers aiming to compromise internal IT infrastructure.

Potential Impact

For European organizations, the impact of CVE-2022-39373 can be significant, especially for those relying on GLPI for managing IT assets, service desks, and software licenses. Successful exploitation could lead to unauthorized script execution within the GLPI web interface, potentially resulting in session hijacking, unauthorized data access, or manipulation of IT asset records. This could disrupt IT service management workflows, compromise sensitive organizational data, and facilitate further lateral movement within the network. Given that GLPI is often used in environments with privileged access to critical IT infrastructure, the vulnerability could indirectly affect the availability and integrity of broader IT services. While exploitation requires administrative privileges, insider threats or compromised administrator accounts could leverage this vulnerability to escalate attacks. The absence of known active exploits reduces immediate risk, but the medium severity rating indicates a need for timely remediation to prevent potential exploitation.

Mitigation Recommendations

1. Immediate upgrade of GLPI installations to version 10.0.4 or later to apply the official patch addressing this vulnerability. 2. Implement strict access controls and monitoring on administrator accounts to prevent unauthorized access or misuse. 3. Conduct regular audits of entity names and other input fields to detect and remove any suspicious or malicious content. 4. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting GLPI interfaces. 5. Educate administrators and users on safe input handling and the risks of injecting untrusted content. 6. Enable Content Security Policy (CSP) headers on GLPI web servers to restrict the execution of unauthorized scripts. 7. Monitor GLPI logs for unusual activities that could indicate attempted exploitation. 8. Where possible, isolate GLPI servers within segmented network zones to limit the impact of a potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf49ae

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 2:36:10 PM

Last updated: 7/29/2025, 6:22:29 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats