CVE-2022-35914
GLPI vulnerability analysis and mitigation

Overview

CVE-2022-35914 affects the htmlawed module in GLPI through version 10.0.2, specifically the file /vendor/htmlawed/htmlawed/htmLawedTest.php, which allows unauthenticated PHP code injection. The vulnerability was discovered in July 2022 and publicly disclosed in September 2022 (NIST, GLPI Advisory).

Technical details

The vulnerability exists in the htmLawedTest.php test script of the third-party HTMLAWED library included in GLPI's vendor folder. The script allows users to control the htmlawed configuration parameters, including a hook function. An attacker can exploit this by using PHP's exec function as the hook, enabling command injection where both the command and parameters are user-controlled (Mayfly Blog). The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (NIST).

Impact

This vulnerability allows unauthenticated remote code execution on affected systems, representing a critical security risk. When GLPI is exposed to the internet, attackers can execute arbitrary commands on the server without requiring authentication (Mayfly Blog).

Mitigation and workarounds

The vulnerability was patched in GLPI version 10.0.3 and 9.5.9. For immediate mitigation without upgrading, administrators should delete the file /vendor/htmlawed/htmlawed/htmLawedTest.php and restrict direct access to the vendor folder. It's also recommended to limit GLPI access to internal networks or place it behind an authentication portal (GLPI Advisory, Mayfly Blog).

Community reactions

The vulnerability received significant attention from the security community, leading to its inclusion in CISA's Known Exploited Vulnerabilities Catalog. Both the HTMLAWED library vendor and GLPI project responded quickly to patch the vulnerability, with GLPI releasing security updates in September 2022 (Hacker News).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management