FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
dmaciejak
Staff
Staff
Article Id 257344
Description

This article describes the Teclib GLPI remote code execution vulnerability assessment with FortiDAST.

 

CVE-2022-35914 vulnerability was discovered in the 3rd-party HTMLAWED module for GLPI.

GLPI (Gestionnaire Libre de Parc Informatique) is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing.

The vulnerability allows PHP code injection that could result in arbitrary code execution in the security context of the web server process.
Scope FortiDAST version 23.2
Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, you will need to enable the FSE group signature “glpi-htmlawed” which will select the underlying script: 'CVE-2022-35914 GLPI PHP code injection via htmlawed module'

 

For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog.

 

For more details regarding mitigating the vulnerability by utilizing Fortinet products, refer to https://www.fortiguard.com/outbreak-alert/glpi-remote-code-execution

Contributors