This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A **Path Traversal** flaw in the GLPI Barcode plugin. π **Consequences**: Attackers can read arbitrary files on the server, leading to **High** Confidentiality and Integrity impact.β¦
π― **Affected**: **GLPI** instances running version **2.x**. π¦ Specifically, those with the **Barcode plugin** installed. β οΈ Versions **prior to 2.6.1** are vulnerable. If you have the plugin, you are at risk.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Attacker Capabilities**: Read **sensitive files** from the server filesystem. π This includes configuration files, source code, or other data.β¦
π **Exploitation Threshold**: **Low**. π **Network** accessible (AV:N). β‘ **Low** complexity (AC:L). π« **No** authentication required (PR:N) and **No** user interaction needed (UI:N). It is an easy, remote attack vector.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π£ **Public Exploits**: **Yes**. π PoCs are available on GitHub (e.g., AK-blank, ProjectDiscovery Nuclei templates). π Wild exploitation is likely possible given the low barrier to entry and public tools.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for GLPI instances with the **Barcode plugin**. π§ͺ Use Nuclei templates or custom scripts targeting `front/send.php`. π Check if the plugin version is **< 2.6.1**.β¦
β **Official Fix**: **Yes**. π οΈ Patched in **Barcode plugin version 2.6.1**. π Commit: `428c3d9adfb446e8492b1c2b7affb3d34072ff46`. Update immediately to the latest version.
Q9What if no patch? (Workaround)
π§ **No Patch Workaround**: Delete the file `front/send.php` from the plugin directory. ποΈ This removes the vulnerable entry point. β οΈ Note: This may break barcode printing functionality, but it stops the leak.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **HIGH**. π¨ CVSS Score indicates **Critical** impact on Confidentiality/Integrity. πββοΈ Low exploitation barrier + Public PoCs = Immediate action required. Patch or apply workaround NOW.