Description
|
|
Humberto Cabrera has discovered a vulnerability in GLPI, which can be exploited by malicious users to conduct SQL injection attacks.
Input passed via the "users_id_assign" POST parameter to /ajax/ticketassigninformation.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 0.83.8. Prior versions may also be affected.
|