GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a “POP chain”. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2021-03-08T17:00:17

Updated: 2024-08-03T18:09:15.583Z

Reserved: 2020-12-22T00:00:00

Link: CVE-2021-21327

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-08T17:15:13.197

Modified: 2024-11-21T05:48:01.770

Link: CVE-2021-21327

cve-icon Redhat

No data.