{"id":"CVE-2022-31056","summary":"SQL injection with _actor parameter in GLPI","details":"GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.","aliases":["GHSA-9q9x-7xxh-w4cg"],"modified":"2026-03-14T11:46:29.584480Z","published":"2022-06-28T00:00:00Z","database_specific":{"cwe_ids":["CWE-89"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31056.json"},"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31056.json"},{"type":"ADVISORY","url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-9q9x-7xxh-w4cg"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31056"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/glpi-project/glpi","events":[{"introduced":"815997021a5df4feb7077a12f6f52769e9bd3459"},{"fixed":"10873706f388795a1d0d72a028eb4ceba36f7169"}]}],"versions":["10.0.0","10.0.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-31056.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}