CVE-2014-9258

GLPI <0.85.1 - SQL Injection

Title source: llm
STIX 2.1

Description

SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.

Exploits (1)

exploitdb WORKING POC
by Kacper Szurek · textwebappsphp
https://www.exploit-db.com/exploits/35528

References (10)

Core 10
Core References
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/35528
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2015:167
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/61367
Third Party Advisory x_refsource_confirm
http://advisories.mageia.org/MGASA-2015-0017.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/show/osvdb/115957

Scores

EPSS 0.0912
EPSS Percentile 92.7%

Details

CWE
CWE-89
Status published
Products (1)
glpi-project/glpi < 0.85
Published Dec 19, 2014
Tracked Since Feb 18, 2026