CVE-2020-15177Cross-site Scripting in Glpi

Severity
6.1MEDIUMNVD
EPSS
0.3%
top 46.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 7
Latest updateOct 8

Description

In GLPI before version 9.5.2, the `install/install.php` endpoint insecurely stores user input into the database as `url_base` and `url_base_api`. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it's possible to steal cookies, perform

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages2 packages

NVDglpi-project/glpi< 9.5.2
CVEListV5glpi-project/glpi>= 0.65, < 9.5.2

Patches

🔴Vulnerability Details

1
OSV
CVE-2020-15177: In GLPI before version 92020-10-07

💬Community

3
Bugzilla
CVE-2020-15177 glpi: install/install.php endpoint insecurely stores user input into the database as url_base and url_base_api leads to XSS2020-10-08
Bugzilla
CVE-2020-15177 glpi: install/install.php endpoint insecurely stores user input into the database as url_base and url_base_api leads to XSS [epel-7]2020-10-08
Bugzilla
CVE-2020-15177 glpi: install/install.php endpoint insecurely stores user input into the database as url_base and url_base_api leads to XSS [fedora-all]2020-10-08