fkie_cve-2011-2720
Vulnerability from fkie_nvd
Published
2011-08-05 21:55
Modified
2024-11-21 01:28
Severity ?
Summary
The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", "matchCriteriaId": "261B196D-8DDC-4DED-B6D4-2EABC3A24C21", "versionEndIncluding": "0.80.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B215CBB3-8525-475A-B5E2-34F62511C7C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "85995AA3-1818-4CA7-BB87-539E43BCBD04", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "BCBDF788-300F-4C67-A0B9-5CFB56BF52E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C5DA370-D9BA-4EFC-B3C3-79B6170BD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "ACCCAC60-7CF1-48ED-B38D-289CABA812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "BAFE68F5-2ED1-4566-8B8D-0CFCD71618CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "128758C3-10AF-4A4E-B994-DE0E1E35D38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*", "matchCriteriaId": "93B2CF5E-C68F-4551-8B91-E6D69039744B", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*", "matchCriteriaId": "71F0CC20-61C8-4538-9DFC-B275FDB549C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*", "matchCriteriaId": "99AAB3E6-22E0-4BA0-A4D7-9C06A8C2FCA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*", "matchCriteriaId": "B8940C0C-82F9-4209-A8D5-A70626F17E8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*", "matchCriteriaId": "A157A31C-CF17-4307-814F-304B428D8799", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*", "matchCriteriaId": "990FDC8A-6E09-4426-BBBE-B7DE56FD66E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*", "matchCriteriaId": "65F994FF-3F3B-4301-AB0C-210576F74FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*", "matchCriteriaId": "F03828AC-AA8C-4AE4-BE3C-1789B4C888B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*", "matchCriteriaId": "495826C7-2191-4120-BCAA-FB295350BD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*", "matchCriteriaId": "A78E9D3B-DEE0-495C-8375-6E1FD78C41A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4F23BF2-781D-4A1D-B979-522BCD0863C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*", "matchCriteriaId": "C69CDDCE-ECF5-490A-99E8-156258EC0927", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*", "matchCriteriaId": "6064A657-3E14-492E-9DF0-6471EF7057B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "348A5071-E1DA-4462-B328-A350704BD070", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*", "matchCriteriaId": "E460C38B-125E-49BD-A616-4979BA9F08BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*", "matchCriteriaId": "185201D0-8E00-48F7-B579-49ED8D25F7D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*", "matchCriteriaId": "1CF28E43-B2A2-4ED4-8ECC-CC2E5C027448", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*", "matchCriteriaId": "FE47B2A4-297E-4057-BFF0-C7B75025E401", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6ECB55F-58A4-43FE-8995-3D1857DCC707", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "43503991-9AB8-4944-ABFA-E8A3FD600257", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*", "matchCriteriaId": "02F2C381-E442-4B00-8147-2C8364145505", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "64BE5EBC-333A-4792-B098-D62B74F1C262", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "F21003DB-A89B-451E-B0C3-E57017138A16", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "A5FD94F2-79E2-4FCD-A5A1-7A6E78938318", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*", "matchCriteriaId": "26DB5DB1-2366-48D0-B534-439EE6DB3921", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*", "matchCriteriaId": "7087437C-5B04-4AC5-9154-2377DF8060D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*", "matchCriteriaId": "9D441EB0-C668-481A-8AE7-B88F2ED444D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*", "matchCriteriaId": "8BEB7ABC-B924-45FC-AE2E-855985BA39B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*", "matchCriteriaId": "1920E885-9119-4674-989B-E454FCD78950", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "E9DC7875-2A5C-4109-911B-90A10F04F414", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*", "matchCriteriaId": "7566410B-4314-4E84-B469-20EDCCBFB77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*", "matchCriteriaId": "1C5C9152-88C4-4D05-8D88-78371ADD6192", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*", "matchCriteriaId": "024E39AB-F10D-4D42-B495-91FFADBBBBA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*", "matchCriteriaId": "A9644DAB-3046-4C22-95CB-D69570631F5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*", "matchCriteriaId": "B33C6E19-A3EE-42A6-B76F-5170F09E4EA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*", "matchCriteriaId": "F94BBB55-D0EB-4088-B579-93BC1930315F", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*", "matchCriteriaId": "C7FF7C06-344D-4647-B9E0-E4223D6F7F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*", "matchCriteriaId": "32250F48-9E4B-4F29-8D61-7762DA7F3C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*", "matchCriteriaId": "5784A35F-A07A-4570-B5AF-41F4BBBE61EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*", "matchCriteriaId": "BCB9B3CD-9741-4620-85E7-9E98D3D08C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*", "matchCriteriaId": "0AA1A5CA-F4D4-451A-92AE-02BBA292515B", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*", "matchCriteriaId": "C6ECFCF2-7415-4BB2-BFC6-B61E7779C055", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*", "matchCriteriaId": "6D88E5E6-547E-4E3F-AE0C-B5CC9ECCBD11", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "12E8EC22-D5BB-42DD-8FD6-C8C89B2FF749", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request." }, { "lang": "es", "value": "La funcionalidad de autocompletado en GLPI en versiones anteriores a la 0.80.2 no excluye campos determinados de nombres de usuario y contrase\u00f1as, lo que permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de determinadas peticiones POST." } ], "id": "CVE-2011-2720", "lastModified": "2024-11-21T01:28:49.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-05T21:55:06.107", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45366" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/45542" }, { "source": "secalert@redhat.com", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=237\u0026lang=en" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:014" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/07/25/7" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/07/26/11" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/48884" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726185" }, { "source": "secalert@redhat.com", "url": "https://forge.indepnet.net/issues/3017" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14951" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14952" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14954" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14955" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14956" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14957" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14958" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14960" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14966" }, { "source": "secalert@redhat.com", "url": "https://forge.indepnet.net/projects/glpi/versions/605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45542" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=237\u0026lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/07/25/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/07/26/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://forge.indepnet.net/issues/3017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14954" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://forge.indepnet.net/projects/glpi/versions/605" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.