CVE-2023-35939

8.1 HIGH

📋 TL;DR

This vulnerability in GLPI allows authenticated users (and in some cases unauthenticated users) to bypass access controls and interact with, modify, or view dashboard data. It affects GLPI versions 9.5.0 through 10.0.7. The issue stems from improper authorization checks on dashboard functionality.

💻 Affected Systems

Products:
  • GLPI
Versions: 9.5.0 through 10.0.7
Operating Systems: All platforms running GLPI
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both authenticated and (for certain actions) unauthenticated access to dashboard functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could manipulate critical dashboard data, potentially altering asset management information, creating false alerts, or hiding malicious activity from administrators.

🟠

Likely Case

Unauthorized users gain access to sensitive dashboard information they shouldn't see, potentially exposing asset details, IT infrastructure data, or operational metrics.

🟢

If Mitigated

With proper network segmentation and strict access controls, impact is limited to dashboard data visibility rather than system compromise.

🌐 Internet-Facing: HIGH - If GLPI is exposed to the internet, attackers can exploit this vulnerability to access or modify dashboard data.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts can exploit this to access unauthorized dashboard information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory indicates some actions may be exploitable without authentication, making this particularly dangerous for internet-facing instances.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.8

Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-cjcx-pwcx-v34c

Restart Required: Yes

Instructions:

1. Backup your GLPI installation and database. 2. Download GLPI 10.0.8 from the official repository. 3. Follow the GLPI upgrade documentation to update to version 10.0.8. 4. Restart your web server service.

🔧 Temporary Workarounds

Restrict Dashboard Access

all

Temporarily restrict access to dashboard functionality via web server configuration or application-level controls.

# Example Apache configuration to restrict /dashboard paths
RewriteRule ^/dashboard.*$ - [F,L]

🧯 If You Can't Patch

  • Implement strict network access controls to limit GLPI access to authorized users only
  • Enable detailed logging and monitoring for dashboard access attempts

🔍 How to Verify

Check if Vulnerable:

Check your GLPI version via the web interface (Setup > General > About) or by examining the GLPI installation files.

Check Version:

grep -r "define\('GLPI_VERSION'" /path/to/glpi/inc/ 2>/dev/null || echo 'Check web interface: Setup > General > About'

Verify Fix Applied:

After patching, verify the version shows 10.0.8 or higher and test dashboard access controls with different user roles.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to dashboard endpoints
  • Unusual dashboard modifications by non-admin users

Network Indicators:

  • HTTP requests to dashboard endpoints from unauthorized IPs or users

SIEM Query:

source="glpi_logs" AND (uri_path="/dashboard*" OR event="dashboard_access") AND user_role!="admin"

🔗 References

📤 Share & Export