Context
This vulnerability affects GLPI software when they are using a third party library named htmlawed.
Exploitation
To reproduce the vulnerability, we used the publicly available PoC here : https://github.com/cosad3s/CVE-2022-35914-poc
The PoC works out-of-the-box and is very simple to use :
%20%5BEn%20fonction%5D%20-%20Oracle%20VM%20VirtualBox.png?alt=media&token=26c8db2e-2ff2-4c7c-8506-97b074a5a93a)
It's impact is critical and it needs to be adressed immediately.
Consequences
Cyber-terms
Direct impact on the confidentiality, integrity ,disponibility and tracability of the assets stored in the server. As the exploitation of the vulnerability does not need authentication to the platform or the server, its impact is critical and provides direct access on the hosting server.
Managerial terms
Exploitation of the vulnerability leads to direct financiary losses by impacting disponibility of business assets and needed post investigation by security experts to assert the network has not been compromized.
Remediation
To remediate this vulnerability, upgrade the GLPI software to the latest version available.