CVE-2023-42462

7.7 HIGH

📋 TL;DR

CVE-2023-42462 is a path traversal vulnerability in GLPI's document upload functionality that allows attackers to delete arbitrary files on the server. This affects all GLPI installations running versions before 10.0.10. Attackers with access to the document upload feature can exploit this to delete critical system files.

💻 Affected Systems

Products:
  • GLPI (Gestionnaire Libre de Parc Informatique)
Versions: All versions before 10.0.10
Operating Systems: All operating systems running GLPI
Default Config Vulnerable: ⚠️ Yes
Notes: All GLPI installations with document upload functionality enabled are vulnerable. The vulnerability exists in the core upload processing code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, configuration files, or application data leading to service disruption, data loss, or privilege escalation.

🟠

Likely Case

Application disruption through deletion of GLPI configuration files, uploaded documents, or database files, causing service outages and data loss.

🟢

If Mitigated

Limited impact to non-critical files if proper file permissions and access controls are implemented, though some data loss may still occur.

🌐 Internet-Facing: HIGH - If GLPI is exposed to the internet, attackers can potentially exploit this vulnerability remotely if they have access to the document upload feature.
🏢 Internal Only: MEDIUM - Internal attackers with access to the GLPI interface can exploit this to cause disruption or data loss within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the document upload functionality. The vulnerability is a straightforward path traversal that can be exploited with basic HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.10

Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-hm76-jh96-7j75

Restart Required: No

Instructions:

1. Backup your GLPI installation and database. 2. Download GLPI version 10.0.10 or later from the official repository. 3. Follow the GLPI upgrade documentation to update your installation. 4. Verify the upgrade was successful by checking the version in the GLPI interface.

🔧 Temporary Workarounds

Disable document upload functionality

all

Temporarily disable the document upload feature in GLPI to prevent exploitation while planning the upgrade.

# Modify GLPI configuration or disable the feature through the interface if available

🧯 If You Can't Patch

  • Implement strict file permissions to limit the impact of file deletion (e.g., run GLPI with minimal privileges, use read-only permissions for critical files)
  • Monitor and audit file deletion activities on the GLPI server using file integrity monitoring tools

🔍 How to Verify

Check if Vulnerable:

Check your GLPI version in the application interface or by examining the GLPI installation files. Versions before 10.0.10 are vulnerable.

Check Version:

# Check GLPI version via web interface or examine the inc/define.php file for version information

Verify Fix Applied:

After upgrading, verify the version shows 10.0.10 or later in the GLPI interface. Test the document upload functionality to ensure it works without allowing path traversal.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion patterns in system logs
  • Multiple failed or suspicious document upload attempts in GLPI logs
  • Error logs showing path traversal attempts

Network Indicators:

  • HTTP requests to document upload endpoints with suspicious file paths containing '../' sequences

SIEM Query:

web_server_logs WHERE url CONTAINS '/front/document.send.php' AND (url CONTAINS '../' OR parameters CONTAINS '../')

🔗 References

📤 Share & Export