CVE-2021-43779

moderate-risk
Published 2022-01-05

GLPI is an open source IT Asset Management, issue tracking system and service desk system. The GLPI addressing plugin in versions < 2.9.1 suffers from authenticated Remote Code Execution vulnerability, allowing access to the server's underlying operating system using command injection abuse of functionality. There is no workaround for this issue and users are advised to upgrade or to disable the addressing plugin.

Do I need to act?

~
3.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: f44a77e45ca4e6b164083774a757bdc7a0d9d93b, 6f55964803054a5acb5feda92c7c7f1d91ab5366
9
CVSS 9.9/10 Critical
NETWORK / LOW complexity

Affected Products (1)

Addressing

Affected Vendors

45
/ 100
moderate-risk
Severity 33/34 · Critical
Exploitability 7/34 · Low
Exposure 5/34 · Minimal