Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php.
2014-05-14T19:55:08.403
2025-04-12T10:46:40.837
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | glpi-project | glpi | ≤ 0.83.8 | Yes |
Application | glpi-project | glpi | 0.83 | Yes |
Application | glpi-project | glpi | 0.83.1 | Yes |
Application | glpi-project | glpi | 0.83.2 | Yes |
Application | glpi-project | glpi | 0.83.3 | Yes |
Application | glpi-project | glpi | 0.83.4 | Yes |
Application | glpi-project | glpi | 0.83.5 | Yes |
Application | glpi-project | glpi | 0.83.6 | Yes |
Application | glpi-project | glpi | 0.83.7 | Yes |
Application | glpi-project | glpi | 0.83.31 | Yes |