CVE-2023-41320

8.1 HIGH

📋 TL;DR

This SQL injection vulnerability in GLPI's UI layout preferences management allows attackers to execute arbitrary SQL commands. Successful exploitation can lead to administrator account takeover, potentially compromising the entire GLPI instance. All GLPI users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • GLPI (Gestionnaire Libre de Parc Informatique)
Versions: Versions before 10.0.10
Operating Systems: All operating systems running GLPI
Default Config Vulnerable: ⚠️ Yes
Notes: All GLPI installations with UI layout preferences enabled are vulnerable. The vulnerability is in core functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining administrator privileges, accessing sensitive data, and potentially pivoting to other systems.

🟠

Likely Case

Administrator account takeover leading to unauthorized access, data theft, and privilege escalation within GLPI.

🟢

If Mitigated

Limited impact if proper input validation and SQL injection protections are in place, though the vulnerability bypasses these controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some knowledge of SQL injection techniques but is straightforward for experienced attackers. The advisory provides technical details that could facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.10

Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476

Restart Required: No

Instructions:

1. Backup your GLPI database and files. 2. Download GLPI 10.0.10 from the official repository. 3. Follow the GLPI upgrade documentation to update your installation. 4. Verify the upgrade completed successfully.

🧯 If You Can't Patch

  • Implement strict network access controls to limit GLPI access to authorized users only.
  • Monitor GLPI logs for unusual SQL query patterns or unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check your GLPI version by logging into the admin interface and navigating to Setup > General > Information. If version is below 10.0.10, you are vulnerable.

Check Version:

Not applicable - version check is done through web interface

Verify Fix Applied:

After upgrading, verify the version shows 10.0.10 or higher in the GLPI admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in GLPI database logs
  • Multiple failed login attempts followed by successful admin login
  • Unexpected changes to user permissions or layout preferences

Network Indicators:

  • Unusual traffic patterns to GLPI's UI layout preference endpoints
  • SQL error messages in HTTP responses

SIEM Query:

source="glpi_logs" AND (message="*SQL*error*" OR message="*injection*" OR message="*layout*preferences*" AND status="error")

🔗 References

📤 Share & Export