CVE-2024-53850

8.2 HIGH

📋 TL;DR

The Addressing GLPI plugin versions 3.0.0 through 3.0.2 contain an information disclosure vulnerability that allows unauthenticated attackers to determine whether specific data exists in the GLPI system by name. This affects all GLPI installations using the vulnerable plugin versions. Attackers can use this to enumerate data and potentially facilitate further attacks.

💻 Affected Systems

Products:
  • GLPI Addressing Plugin
Versions: 3.0.0 through 3.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GLPI installations with the Addressing plugin enabled and within the vulnerable version range.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate all data names in the system, potentially identifying sensitive information, users, or systems to target for further attacks, leading to data breach or system compromise.

🟠

Likely Case

Attackers will enumerate available data names to understand the system layout and identify potential targets for follow-up attacks, increasing the attack surface.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure about data existence without actual data access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and exploitation is straightforward based on the advisory details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.3

Vendor Advisory: https://github.com/pluginsGLPI/addressing/security/advisories/GHSA-fw42-79gw-7qr9

Restart Required: No

Instructions:

1. Update the Addressing plugin to version 3.0.3 or later via GLPI plugin management interface. 2. Verify the update completed successfully. 3. Test plugin functionality.

🔧 Temporary Workarounds

Disable Addressing Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

Navigate to GLPI Administration > Plugins > Addressing > Disable

Restrict Network Access

all

Limit access to GLPI web interface to trusted networks only

Configure firewall rules to restrict access to GLPI port (typically 80/443)

🧯 If You Can't Patch

  • Implement strict network access controls to limit GLPI access to authorized users only
  • Monitor for unusual enumeration attempts against the GLPI web interface

🔍 How to Verify

Check if Vulnerable:

Check GLPI plugin management interface for Addressing plugin version. If version is between 3.0.0 and 3.0.2 inclusive, system is vulnerable.

Check Version:

Check via GLPI web interface: Administration > Plugins > Addressing

Verify Fix Applied:

Verify Addressing plugin version is 3.0.3 or higher in GLPI plugin management interface.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed or unusual requests to Addressing plugin endpoints from single IP
  • Patterns of enumeration-like requests to data endpoints

Network Indicators:

  • Unusual HTTP request patterns to /plugins/addressing/ endpoints
  • Requests attempting to enumerate data by name

SIEM Query:

source="glpi_access.log" AND (uri="/plugins/addressing/*" OR user_agent="*scanner*") | stats count by src_ip

🔗 References

📤 Share & Export