CVE-2020-11060

HIGH

GLPI <9.4.6 - Command Injection

Title source: llm

Description

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

Exploits (3)

exploitdb WORKING POC
by Brian Peters · pythonwebappsphp
https://www.exploit-db.com/exploits/51726
exploitdb WORKING POC
by Brian Peters · pythonwebappsphp
https://www.exploit-db.com/exploits/49992
nomisec WORKING POC 8 stars
by 0xdreadnaught · poc
https://github.com/0xdreadnaught/cve-2020-11060-poc

Scores

CVSS v3 7.4
EPSS 0.0701
EPSS Percentile 91.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

Details

CWE
CWE-74 CWE-352
Status published
Products (1)
glpi-project/glpi < 9.4.6
Published May 12, 2020
Tracked Since Feb 18, 2026