CVE-2013-5696
23.09.2013, 03:49
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
Vendor | Product | Version |
---|---|---|
glpi-project | glpi | 𝑥 ≤ 0.84.1 |
glpi-project | glpi | 0.5 |
glpi-project | glpi | 0.5:rc1 |
glpi-project | glpi | 0.5:rc2 |
glpi-project | glpi | 0.6 |
glpi-project | glpi | 0.6:rc1 |
glpi-project | glpi | 0.6:rc2 |
glpi-project | glpi | 0.6:rc3 |
glpi-project | glpi | 0.20 |
glpi-project | glpi | 0.21 |
glpi-project | glpi | 0.30 |
glpi-project | glpi | 0.31 |
glpi-project | glpi | 0.40 |
glpi-project | glpi | 0.41 |
glpi-project | glpi | 0.42 |
glpi-project | glpi | 0.51 |
glpi-project | glpi | 0.51a:a |
glpi-project | glpi | 0.65 |
glpi-project | glpi | 0.65:rc1 |
glpi-project | glpi | 0.65:rc2 |
glpi-project | glpi | 0.68 |
glpi-project | glpi | 0.68:rc1 |
glpi-project | glpi | 0.68:rc2 |
glpi-project | glpi | 0.68:rc3 |
glpi-project | glpi | 0.68.1 |
glpi-project | glpi | 0.68.2 |
glpi-project | glpi | 0.68.3 |
glpi-project | glpi | 0.70 |
glpi-project | glpi | 0.70:rc1 |
glpi-project | glpi | 0.70:rc2 |
glpi-project | glpi | 0.70:rc3 |
glpi-project | glpi | 0.70.1 |
glpi-project | glpi | 0.70.2 |
glpi-project | glpi | 0.71 |
glpi-project | glpi | 0.71.1 |
glpi-project | glpi | 0.71.1:rc1 |
glpi-project | glpi | 0.71.1:rc2 |
glpi-project | glpi | 0.71.1:rc3 |
glpi-project | glpi | 0.71.2 |
glpi-project | glpi | 0.71.3 |
glpi-project | glpi | 0.71.4 |
glpi-project | glpi | 0.71.5 |
glpi-project | glpi | 0.71.6 |
glpi-project | glpi | 0.72 |
glpi-project | glpi | 0.72:rc1 |
glpi-project | glpi | 0.72:rc2 |
glpi-project | glpi | 0.72:rc3 |
glpi-project | glpi | 0.72.1 |
glpi-project | glpi | 0.72.2 |
glpi-project | glpi | 0.72.3 |
glpi-project | glpi | 0.72.4 |
glpi-project | glpi | 0.78 |
glpi-project | glpi | 0.78.1 |
glpi-project | glpi | 0.78.2 |
glpi-project | glpi | 0.78.3 |
glpi-project | glpi | 0.78.4 |
glpi-project | glpi | 0.78.5 |
glpi-project | glpi | 0.80 |
glpi-project | glpi | 0.80.1 |
glpi-project | glpi | 0.80.2 |
glpi-project | glpi | 0.80.3 |
glpi-project | glpi | 0.80.4 |
glpi-project | glpi | 0.80.5 |
glpi-project | glpi | 0.80.6 |
glpi-project | glpi | 0.80.7 |
glpi-project | glpi | 0.80.61 |
glpi-project | glpi | 0.83 |
glpi-project | glpi | 0.83.1 |
glpi-project | glpi | 0.83.2 |
glpi-project | glpi | 0.83.3 |
glpi-project | glpi | 0.83.4 |
glpi-project | glpi | 0.83.5 |
glpi-project | glpi | 0.83.6 |
glpi-project | glpi | 0.83.7 |
glpi-project | glpi | 0.83.8 |
glpi-project | glpi | 0.83.9 |
glpi-project | glpi | 0.83.31 |
glpi-project | glpi | 0.83.91 |
glpi-project | glpi | 0.84 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration