CVE-2024-27756

8.8 HIGH

📋 TL;DR

CVE-2024-27756 is a CSV injection vulnerability in GLPI that allows attackers to embed malicious formulas in asset titles. When exported to CSV and opened in spreadsheet applications like Excel, these formulas can execute arbitrary commands. This affects GLPI instances where users can create assets.

💻 Affected Systems

Products:
  • GLPI
Versions: through 10.0.12
Operating Systems: All platforms running GLPI
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configuration when asset creation is enabled. Requires user with asset creation privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on victim's machine when malicious CSV is opened in Excel, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Local code execution on the victim's computer when they open a malicious CSV export, allowing attacker to steal credentials, install malware, or pivot to internal networks.

🟢

If Mitigated

Limited to social engineering success - requires victim to open CSV in vulnerable spreadsheet application and enable macros/formulas.

🌐 Internet-Facing: MEDIUM - Requires authenticated access to create assets, but internet-facing GLPI instances increase attack surface.
🏢 Internal Only: HIGH - Internal users with asset creation privileges can target colleagues with malicious exports.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access to create assets. CSV injection techniques are well-documented and easy to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.13 and later

Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-xxxx-xxxx-xxxx

Restart Required: No

Instructions:

1. Backup your GLPI installation and database. 2. Download GLPI 10.0.13 or later from official repository. 3. Follow standard GLPI upgrade procedure. 4. Verify CSV exports properly sanitize formula characters.

🔧 Temporary Workarounds

Input Sanitization

all

Add custom validation to sanitize formula characters (=, +, -, @) in asset titles before saving.

Modify GLPI source code to escape CSV formula characters in asset creation forms

Export Restrictions

all

Restrict CSV export capabilities to trusted users only.

Configure GLPI permissions to limit CSV export to administrators only

🧯 If You Can't Patch

  • Implement strict input validation to block formula characters (=, +, -, @) in asset titles
  • Educate users to never open CSV files from untrusted sources in spreadsheet applications

🔍 How to Verify

Check if Vulnerable:

Attempt to create an asset with title starting with =cmd|' /C calc'!A0 and export to CSV. If formula executes when opened in Excel, system is vulnerable.

Check Version:

Check GLPI version in Administration > General > Information or via database: SELECT value FROM glpi_configs WHERE name = 'version'

Verify Fix Applied:

After patching, attempt same test - formula characters should be properly escaped in CSV output.

📡 Detection & Monitoring

Log Indicators:

  • Asset creation logs with formula characters (=, +, -, @) in titles
  • Multiple CSV export requests from single user

Network Indicators:

  • CSV file downloads from GLPI with suspicious content

SIEM Query:

source="glpi" AND (asset_title="=*" OR asset_title="+*" OR asset_title="-*" OR asset_title="@*")

🔗 References

📤 Share & Export