Description
SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.
Exploits (1)
References (10)
Core 10
Core References
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/35528
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2015:167
Exploit x_refsource_misc
http://security.szurek.pl/glpi-085-blind-sql-injection.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/61367
Third Party Advisory x_refsource_confirm
http://advisories.mageia.org/MGASA-2015-0017.html
Patch, Vendor Advisory x_refsource_confirm
http://www.glpi-project.org/spip.php?page=annonce&id_breve=334&lang=en
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/show/osvdb/115957
Scores
EPSS
0.0912
EPSS Percentile
92.7%
Details
CWE
CWE-89
Status
published
Products (1)
glpi-project/glpi
< 0.85
Published
Dec 19, 2014
Tracked Since
Feb 18, 2026