GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of every other user, even admin ones. Steps to reproduce the behavior: 1. Create a new planning with eduardo.mozart user (from IT group that belongs to Super-admin) into its personal planning at Assistance > Planning. 2. Copy the CalDAV url and use a CalDAV client (e.g. Thunderbird) to sync the planning with the provided URL. 3. Inform the username and password from any valid user (e.g. camila from Proativa group). 4. Camila has read-only access to eduardo.mozart personal planning. The same behavior happens to any group. E.g. Camila has access to IT group planning, even if she doesnt belong to this group and has a Self-service profile permission). This issue is fixed in version 9.5.3. As a workaround, one can remove the caldav.php
file to block access to CalDAV server.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Glpi | Glpi-project | * | 9.5.3 (excluding) |
Glpi | Ubuntu | trusty | * |
Glpi | Ubuntu | xenial | * |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied, users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.