{"id":"UBUNTU-CVE-2014-8360","details":"Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php.","modified":"2025-07-16T07:17:21.777635Z","published":"2015-04-14T18:59:00Z","withdrawn":"2025-07-18T16:43:06Z","upstream":["CVE-2014-8360"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8360"},{"type":"REPORT","url":"https://forge.glpi-project.org/issues/5101"},{"type":"REPORT","url":"https://forge.glpi-project.org/issues/5113"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-8360"}],"affected":[{"package":{"name":"glpi","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/glpi@0.84.8+dfsg.1-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.84.8+dfsg.1-1"}]}],"ecosystem_specific":{"binaries":[{"binary_version":"0.84.8+dfsg.1-1","binary_name":"glpi"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-8360.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"low"}]}