CVE-2023-28634
📋 TL;DR
This vulnerability allows a user with Technician profile in GLPI to generate a personal token for a Super-Admin account, enabling privilege escalation to administrative access. It affects GLPI versions 0.83 through 9.5.12 and 10.0.6. Attackers can hijack Super-Admin sessions and gain full system control.
💻 Affected Systems
- GLPI
📦 What is this software?
Glpi by Glpi Project
Glpi by Glpi Project
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where attackers gain Super-Admin privileges, potentially accessing sensitive data, modifying configurations, and deploying malware across the IT infrastructure.
Likely Case
Unauthorized administrative access leading to data theft, configuration changes, and potential lateral movement within the network.
If Mitigated
Limited impact if proper access controls, network segmentation, and monitoring are in place to detect unusual administrative activity.
🎯 Exploit Status
Exploitation requires authenticated access with Technician privileges. The attack vector is straightforward once initial access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.5.13 or 10.0.7
Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39
Restart Required: No
Instructions:
1. Backup your GLPI database and files. 2. Download the patched version (9.5.13 or 10.0.7) from the official GLPI repository. 3. Follow the standard GLPI upgrade procedure for your version. 4. Verify the upgrade completed successfully.
🔧 Temporary Workarounds
Restrict Technician Profile Access
allTemporarily remove or restrict Technician profile permissions until patching can be completed.
# Review and modify user profiles in GLPI administration panel
# Consider temporarily disabling Technician accounts if not critical
Network Segmentation
allIsolate GLPI instances from critical systems and implement strict network access controls.
# Configure firewall rules to restrict GLPI access
# Implement VLAN segmentation for GLPI servers
🧯 If You Can't Patch
- Implement strict monitoring of user token generation and Super-Admin account activity
- Reduce the number of Technician accounts and implement least privilege access controls
🔍 How to Verify
Check if Vulnerable:
Check GLPI version in administration panel or via 'php glpi/console.php version' command. If version is between 0.83-9.5.12 or exactly 10.0.6, the system is vulnerable.
Check Version:
php glpi/console.php version
Verify Fix Applied:
After upgrade, verify version is 9.5.13 or 10.0.7. Test that Technician users cannot generate tokens for Super-Admin accounts.
📡 Detection & Monitoring
Log Indicators:
- Unusual token generation events
- Multiple failed login attempts followed by successful Super-Admin login
- User privilege escalation logs
Network Indicators:
- Unusual administrative access patterns
- Traffic from unexpected sources to GLPI administrative endpoints
SIEM Query:
source="glpi" AND (event="token_generation" OR event="privilege_escalation")
🔗 References
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39