CVE-2014-9258
Published: 19 December 2014
SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.
Priority
Status
Package | Release | Status |
---|---|---|
glpi Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
lucid |
Ignored
(end of life)
|
|
mantic |
Does not exist
|
|
noble |
Does not exist
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Needs triage
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Needed
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Does not exist
|
References
- http://www.glpi-project.org/spip.php?page=annonce&id_breve=334&lang=en
- http://www.exploit-db.com/exploits/35528
- http://security.szurek.pl/glpi-085-blind-sql-injection.html
- http://secunia.com/advisories/61367
- http://osvdb.org/show/osvdb/115957
- https://www.cve.org/CVERecord?id=CVE-2014-9258
- NVD
- Launchpad
- Debian