Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2022-35914 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: GLPI v10.0.2 & earlier suffers from **PHP Code Injection** via the `htmLawedTest.php` file. <br>πŸ’₯ **Consequences**: Attackers can execute arbitrary PHP commands, leading to full system compromise.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Flaw in the **htmlawed** module (`/vendor/htmlawed/htmlawed/htmLawedTest.php`). <br>⚠️ **CWE**: Not specified in data, but clearly a **Code Injection** flaw allowing untrusted input execution.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **GLPI** (IT Asset Management Software). <br>πŸ“… **Versions**: **10.0.2 and prior**. <br>πŸ”§ **Component**: `htmlawed` library integration.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: **Unauthenticated Remote Code Execution (RCE)**. <br>πŸ“‚ **Data**: Full access to server commands (e.g., `cat /etc/passwd`). <br>πŸ”“ **Impact**: Complete takeover of the affected instance without login.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>πŸ”‘ **Auth**: **None required** (Unauthenticated). <br>βš™οΈ **Config**: Direct HTTP POST to specific test endpoint. Easy to trigger.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exp**: **YES**. <br>πŸ“œ **PoCs**: Multiple GitHub repos (e.g., `0xGabe`, `Lzer0Kx01`) provide curl commands and scripts. <br>🌐 **Wild Exp**: Active scanning tools exist for batch detection.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Send POST request to `/vendor/htmlawed/htmlawed/htmLawedTest.php` with `hhook=exec`. <br>πŸ“‘ **Scan**: Use provided GitHub PoC scripts or PacketStorm reports to identify vulnerable instances.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fixed**: **YES**. <br>πŸ“’ **Patch**: GLPI **10.0.3** released to address this. <br>πŸ”— **Ref**: Official GLPI announcement confirms the fix.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **Block Access**: Restrict access to `/vendor/htmlawed/` directory via WAF or Nginx/Apache config. <br>🚫 **Disable**: If possible, remove or disable the `htmLawedTest.php` file entirely.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL**. <br>🚨 **Priority**: **Immediate Action**. Unauthenticated RCE is high-risk. Update to v10.0.3+ or apply network restrictions NOW.