Learn about CVE-2021-39210, a medium-severity vulnerability in GLPI versions prior to 9.5.6. Find out the impact, technical details, and steps to mitigate the autologin cookie issue.
GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, the cookie used to store the autologin cookie (when a user uses the 'remember me' feature) is accessible by scripts. This issue allows a malicious plugin to steal the autologin cookie and use it for autologin. The problem is fixed in version 9.5.6, with a recommended workaround to avoid using the 'remember me' feature.
Understanding CVE-2021-39210
This section provides insights into the details of CVE-2021-39210.
What is CVE-2021-39210?
CVE-2021-39210 involves an issue in GLPI versions prior to 9.5.6 where the autologin cookie is accessible by scripts, potentially leading to unauthorized access.
The Impact of CVE-2021-39210
The impact of this CVE is classified as medium severity. It has a CVSS base score of 6.5, with high confidentiality impact and low privileges required for exploitation.
Technical Details of CVE-2021-39210
This section delves into the technical aspects of CVE-2021-39210.
Vulnerability Description
The vulnerability relates to the accessibility of the autologin cookie by scripts in GLPI versions before 9.5.6, enabling unauthorized autologin.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by malicious plugins or scripts to steal the autologin cookie and perform unauthorized autologin.
Mitigation and Prevention
In this section, various mitigation strategies and prevention measures are outlined.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about GLPI security advisories and promptly apply patches and updates provided by the glpi-project.