Security for everyone

CVE-2022-35914 Scanner

Detects 'Code Injection' vulnerability in GLPI affects v. through 10.0.2.

SCAN NOW

Short Info


Level

Critical

Type

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-35914 Scanner Detail

GLPI, a web-based IT service management software, is widely used to manage IT infrastructure, help desks, and assets across many businesses and organizations. With a user-friendly interface and a comprehensive list of features, GLPI simplifies the daunting task of maintaining and tracking IT systems. Its modules help streamline IT service requests, improve support ticket management, and ensure that computer hardware and software systems are up-to-date. GLPI is an open-source software that is freely available to users, and has been praised for its flexibility and customization options.

However, CVE-2022-35914 is a vulnerability that was discovered in GLPI Version 10.0.2, specifically in the htmLawedTest.php file within the htmlawed module. This vulnerability can be exploited to inject PHP code into the system, which can then execute arbitrary code. The severity of this vulnerability is considerable, as it could lead to loss of data, system crashes, and unauthorized access to sensitive information. This vulnerability can be easily exploited by attackers who have access to the system, which is a significant concern for businesses and organizations.

If an attacker successfully exploits CVE-2022-35914, they can perform various malicious actions, such as installing malware, stealing data, and compromising the integrity of the system. It can also allow attackers to gain access to privileged accounts and critical systems, which can lead to severe damage to the organization. The consequences of this vulnerability could be devastating and can significantly impact businesses and organizations.

In conclusion, CVE-2022-35914 is a vulnerability that can seriously impact the security of GLPI installations. Businesses and organizations need to take appropriate measures to mitigate the risks associated with such vulnerabilities. By using security monitoring tools, such as the pro features of the securityforeveryone.com platform, businesses and organizations can quickly and easily identify vulnerabilities in their digital assets, enabling them to address security issues promptly and effectively.

 

REFERENCES

cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture