CVE-2024-48912

8.1 HIGH

📋 TL;DR

This vulnerability in GLPI allows authenticated users to delete any user account via a specific application endpoint. It affects GLPI versions 10.0.0 through 10.0.16. Any organization using vulnerable GLPI versions with authenticated user access is at risk.

💻 Affected Systems

Products:
  • GLPI
Versions: 10.0.0 through 10.0.16
Operating Systems: All platforms running GLPI
Default Config Vulnerable: ⚠️ Yes
Notes: All GLPI installations with default configuration in affected version range are vulnerable. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with authenticated access could delete all user accounts, including administrators, causing complete loss of access to the GLPI system and potential business disruption.

🟠

Likely Case

Malicious insider or compromised user account deletes targeted user accounts, disrupting operations and requiring account restoration.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized deletion of some accounts that can be restored from backups.

🌐 Internet-Facing: HIGH if GLPI is exposed to the internet with authenticated user access.
🏢 Internal Only: HIGH as authenticated internal users can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in a specific endpoint that can be accessed via web requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.17

Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-vjmw-j32j-ph4f

Restart Required: No

Instructions:

1. Backup your GLPI database and files. 2. Download GLPI 10.0.17 from the official repository. 3. Follow the GLPI upgrade procedure for your installation method (manual, package manager, etc.). 4. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict User Account Deletion Permissions

all

Temporarily restrict user account deletion capabilities to only administrators while waiting to patch.

Configure GLPI user permissions to remove 'delete user' rights from non-admin users

Network Access Controls

all

Restrict access to GLPI endpoints to only trusted IP addresses or networks.

Configure firewall/web server rules to limit access to GLPI application

🧯 If You Can't Patch

  • Implement strict access controls and monitor user account deletion activities
  • Regularly backup user account data and maintain restore procedures

🔍 How to Verify

Check if Vulnerable:

Check GLPI version via the web interface (Setup > General > Information) or by examining the GLPI installation files.

Check Version:

Check GLPI web interface at Setup > General > Information or examine the GLPI installation directory for version files.

Verify Fix Applied:

Verify GLPI version is 10.0.17 or higher and test that authenticated non-admin users cannot delete other user accounts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user deletion events in GLPI logs
  • Multiple user deletion requests from single authenticated user
  • User deletion requests targeting administrative accounts

Network Indicators:

  • HTTP POST requests to user deletion endpoints from non-admin users
  • Unusual patterns of account management requests

SIEM Query:

source="glpi_logs" AND (event="user_deletion" OR action="delete_user") AND user_role!="admin"

🔗 References

📤 Share & Export