Logo Navixia

Follow us linkedintwitterrss

Navixia Cybersecurity Blog

Navixia finds critical vulnerabilities in GLPI (CVE-2013-5696)

Posted by on

Vulnerability in GLPIThe following article describes in detail two critical vulnerabilities found on GLPI by the Navixia Research Team.

These vulnerabilities have been reported to the software publisher and are already fixed in the latest release (0.84.2). A CVE has been attached with the following reference: CVE-2013-5696.

These vulnerabilities appear to be present on GLPI from version 0.68, released in 2006. However, the present article expands on source code taken from version 0.84, released on 09.08.2013.

GLPI (Gestion Libre de Parc Informatique) is an Open-Source web application designed to manage IT infrastructure and distributed under the General Public Licence (GPL). Currently, it is estimated that 2’400 entities use GLPI with an average of 800 users per entity. This represents a total of about 1'900'000 users.

The file "install/install.php" can be executed even if the installation process has already been performed. After setting the language, it checks the existence of the variable $ _POST ['install']. It enters a switch case based on its value en then calls the corresponding function.

File "install/install.php"

if (!isset($_POST["install"])) {
	$_SESSION = array();
	if (file_exists(GLPI_CONFIG_DIR."/config_db.php")) {
	} else {
		header_html("Select your language");
} else {
switch ($_POST["install"]) {

This section is problematic as it is possible to call any stage of the installation even if the application is already installed.

If, for example, we call the stage 'Etape_4', which is actually the function 'step7', it is possible to perform a SQL injection from HTTP headers (by changing the value of the referrer).

File "install/install.php"

function step7() {
	global $LANG, $CFG_GLPI;
	require_once (GLPI_ROOT . "/inc/dbmysql.class.php");
	require_once (GLPI_CONFIG_DIR . "/config_db.php");
	$DB = new DB();
	$query = "UPDATE `glpi_configs`
	SET `url_base` = '".str_replace("/install/install.php", "", $_SERVER['HTTP_REFERER'])."'
	WHERE `id` = '1'";

We can exploit this vulnerability to either trigger an error or use it as a blind sql injection point.

Based on the previous finding, we note that the 'update1' function (step 'update_1') is particularly interesting as it defines the connection parameters to the database used in create_conn_file function.

File "install/install.php"

function create_conn_file($host, $user, $password, $DBname) {
	global $CFG_GLPI;
	$DB_str = "";
	$fp = fopen(GLPI_CONFIG_DIR . "/config_db.php",'wt');
	if ($fp) {
		$fw = fwrite($fp,$DB_str);
		return true;
		return false;
	function update1($host, $user, $password, $DBname) {
		global $LANG;
		if (create_conn_file($host,$user,$password,$DBname) && !empty($DBname)) {
			$from_install = true;
			include(GLPI_ROOT ."/install/update.php");

The parameters passed to the function 'update1' (host, user, password and DBname) are variables controlled by the user in a POST request:

File "install/install.php"

case "update_1" :
	if (empty($_POST["databasename"])) {
		$_POST["databasename"] = "";
	update1($_POST["db_host"], $_POST["db_user"], $_POST["db_pass"], $_POST["databasename"]);

As parameters are defined by the user, it is possible to redefine after the installation the username, password and database name used by the application. The exploitation of this vulnerability on a production system will end up in a denial of service as the connection parameters to the database are no longer valid. This could also be used to connect to another database on another host.

Much more critical, if magic_quotes are disabled (which is now a default parameter), an attacker can specify values to the server that will execute PHP code. He could for example get a shell which would end up in a full compromise of the machine. From there he could use it as pivot to reach the internal network.  

A Metasploit module has been developed by Navixia. It tests the existence of this vulnerability and then exploits it. It will be published on this website soon.



  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Monday, 21 April 2014

Recent Comments

Je poste les infos ici sur conseils de navixia :Nom : Clara Moulin Adresse mail : clara82moulin@gmai...
Bonjour, j'ai rencontré le même type d'arnaque (mail avec plus de détails envoyé à navixia) sur le ...
J ai failli me faire avoir avec une voiture de collection entreposée a Nice chez un transporteur et ...

très intéressant, même si la cocotte méritait d'être retrouvée et balancée

une solution, ne jamais acheter de seconde main sur ces sites, surtout sur ebay... pour les 4000eur,...

Navixia SA

Route du Bois 1 | CH-1024 Ecublens

Tél. +41 21 324 32 00 | Fax. +41 21 324 32 01

Contact and location

© 2014 Navixia SA