CVE-2024-38370
📋 TL;DR
This vulnerability in GLPI allows unauthorized users to download documents via the API without proper authentication. It affects GLPI installations running versions 9.2.0 through 10.0.15. Users with access to the API endpoint can exploit this to access sensitive documents they shouldn't have permission to view.
💻 Affected Systems
- GLPI
📦 What is this software?
Glpi by Glpi Project
⚠️ Risk & Real-World Impact
Worst Case
An attacker could download sensitive documents containing confidential information, credentials, or proprietary data, leading to data breach and compliance violations.
Likely Case
Unauthorized users accessing documents they shouldn't have permission to view, potentially exposing internal documentation or user-uploaded files.
If Mitigated
Limited exposure if API access is restricted to trusted networks and proper authentication controls are in place.
🎯 Exploit Status
Exploitation requires access to the API endpoint but doesn't require authentication for the specific document download functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.0.16
Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-xrm2-m72w-w4x4
Restart Required: No
Instructions:
1. Backup your GLPI installation and database. 2. Download GLPI 10.0.16 or later from the official repository. 3. Follow the GLPI upgrade documentation to apply the update. 4. Verify the update was successful by checking the version.
🔧 Temporary Workarounds
Restrict API Access
allLimit API access to trusted IP addresses or disable API functionality if not needed.
Configure web server (Apache/Nginx) to restrict access to /api/* endpoints
🧯 If You Can't Patch
- Implement strict network segmentation to limit API access to authorized users only
- Monitor API access logs for unauthorized document download attempts
🔍 How to Verify
Check if Vulnerable:
Check GLPI version via the web interface (Setup > General > Information) or by examining the GLPI installation files.
Check Version:
Check Setup > General > Information in GLPI web interface or examine inc/define.php file
Verify Fix Applied:
Verify version is 10.0.16 or later and test document download permissions through API with unauthorized user accounts.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized API requests to document download endpoints
- Multiple failed authentication attempts followed by successful document downloads
Network Indicators:
- Unusual patterns of API requests to document endpoints from unauthorized IPs
SIEM Query:
source="glpi_logs" AND (uri_path="/api/document/download" OR uri_path LIKE "/api/document/%/download") AND user="anonymous" OR auth_status="failed"