{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T18:01:41.983","vulnerabilities":[{"cve":{"id":"CVE-2020-15176","sourceIdentifier":"security-advisories@github.com","published":"2020-10-07T19:15:12.720","lastModified":"2024-11-21T05:05:00.597","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2"},{"lang":"es","value":"En GLPI versiones anteriores a 9.5.2, cuando se suministra un back tick en la entrada que se coloca en una consulta SQL, la aplicación no escapa ni se sanea, permitiendo que ocurra una inyección SQL.&#xa0;Al aprovechar esta vulnerabilidad, un atacante es capaz de exfiltrar información confidencial como contraseñas, tokens de restablecimiento, detalles personales y más.&#xa0;El problema es parcheado en la versión 9.5.2"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*","versionEndExcluding":"9.5.2","matchCriteriaId":"4FDDC1DB-791A-495C-84D1-110B95394022"}]}]}],"references":[{"url":"https://github.com/glpi-project/glpi/commit/f021f1f365b4acea5066d3e57c6d22658cf32575","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-x93w-64x9-58qw","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/glpi-project/glpi/commit/f021f1f365b4acea5066d3e57c6d22658cf32575","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-x93w-64x9-58qw","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}