CVE-2011-2720
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
05/08/2011
Last modified:
11/04/2025
Description
The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* | 0.80.1 (including) | |
| cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
- http://secunia.com/advisories/45366
- http://secunia.com/advisories/45542
- http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A014
- http://www.openwall.com/lists/oss-security/2011/07/25/7
- http://www.openwall.com/lists/oss-security/2011/07/26/11
- http://www.securityfocus.com/bid/48884
- https://bugzilla.redhat.com/show_bug.cgi?id=726185
- https://forge.indepnet.net/issues/3017
- https://forge.indepnet.net/projects/glpi/repository/revisions/14951
- https://forge.indepnet.net/projects/glpi/repository/revisions/14952
- https://forge.indepnet.net/projects/glpi/repository/revisions/14954
- https://forge.indepnet.net/projects/glpi/repository/revisions/14955
- https://forge.indepnet.net/projects/glpi/repository/revisions/14956
- https://forge.indepnet.net/projects/glpi/repository/revisions/14957
- https://forge.indepnet.net/projects/glpi/repository/revisions/14958
- https://forge.indepnet.net/projects/glpi/repository/revisions/14960
- https://forge.indepnet.net/projects/glpi/repository/revisions/14966
- https://forge.indepnet.net/projects/glpi/versions/605
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
- http://secunia.com/advisories/45366
- http://secunia.com/advisories/45542
- http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A014
- http://www.openwall.com/lists/oss-security/2011/07/25/7
- http://www.openwall.com/lists/oss-security/2011/07/26/11
- http://www.securityfocus.com/bid/48884
- https://bugzilla.redhat.com/show_bug.cgi?id=726185
- https://forge.indepnet.net/issues/3017
- https://forge.indepnet.net/projects/glpi/repository/revisions/14951
- https://forge.indepnet.net/projects/glpi/repository/revisions/14952
- https://forge.indepnet.net/projects/glpi/repository/revisions/14954
- https://forge.indepnet.net/projects/glpi/repository/revisions/14955
- https://forge.indepnet.net/projects/glpi/repository/revisions/14956
- https://forge.indepnet.net/projects/glpi/repository/revisions/14957
- https://forge.indepnet.net/projects/glpi/repository/revisions/14958
- https://forge.indepnet.net/projects/glpi/repository/revisions/14960
- https://forge.indepnet.net/projects/glpi/repository/revisions/14966
- https://forge.indepnet.net/projects/glpi/versions/605



