{"id":"CVE-2022-34125","details":"front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.","modified":"2026-04-12T03:45:17.697913Z","published":"2023-04-16T03:15:07.280Z","related":["GHSA-wv59-3rv4-vm9f"],"references":[{"type":"ADVISORY","url":"https://github.com/InfotelGLPI/cmdb/releases/tag/3.0.3"},{"type":"ADVISORY","url":"https://github.com/InfotelGLPI/cmdb/security/advisories/GHSA-wv59-3rv4-vm9f"},{"type":"ADVISORY","url":"https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/infotelglpi/cmdb","events":[{"introduced":"0"},{"fixed":"78d9708abda4b7a2b0cf0a68b63c56b607c9766d"}],"database_specific":{"cpe":"cpe:2.3:a:glpi-project:cmdb:*:*:*:*:*:glpi:*:*","source":["CPE_FIELD","REFERENCES"],"extracted_events":[{"introduced":"0"},{"fixed":"3.0.3"}]}}],"versions":["2.2.1","3.0.0","3.0.0-rc1","3.0.0-rc2","3.0.1","3.0.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-34125.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}