Vulnerability Details : CVE-2021-39210
GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, the cookie used to store the autologin cookie (when a user uses the "remember me" feature) is accessible by scripts. A malicious plugin that could steal this cookie would be able to use it to autologin. This issue is fixed in version 9.5.6. As a workaround, one may avoid using the "remember me" feature.
Products affected by CVE-2021-39210
- cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-39210
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-39210
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:P/I:N/A:N |
6.8
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2021-39210
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
-
The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2021-39210
-
https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/
huntr: Sensitive Cookie Without 'HttpOnly' Flag PHP Vulnerability in glpiThird Party Advisory
-
https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2
Autologin cookie accessible by scripts · Advisory · glpi-project/glpi · GitHubThird Party Advisory
-
https://github.com/glpi-project/glpi/releases/tag/9.5.6
Release 9.5.6 · glpi-project/glpi · GitHubRelease Notes;Third Party Advisory
Jump to