Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-35914

Description

/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.

POC

Reference

- http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html

- https://github.com/Orange-Cyberdefense/CVE-repository/

- https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_2022-35914.sh

- https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0romos/CVE-2022-35914

- https://github.com/0xBallpoint/LOAD

- https://github.com/0xD13/OSCP-Prep-Guide

- https://github.com/0xGabe/CVE-2022-35914

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/6E6L6F/CVE-2022-35914

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/Feals-404/GLPIAnarchy

- https://github.com/Gabriel-Lima232/CVE-2022-35914

- https://github.com/Henry4E36/POCS

- https://github.com/J1ezds/Vulnerability-Wiki-page

- https://github.com/JD2344/SecGen_Exploits

- https://github.com/Johnermac/CVE-2022-35914

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/Loginsoft-LLC/Linux-Exploit-Detection

- https://github.com/Loginsoft-Research/Linux-Exploit-Detection

- https://github.com/Lzer0Kx01/CVE-2022-35914

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/Mr-Tree-S/POC_EXP

- https://github.com/Orange-Cyberdefense/CVE-repository

- https://github.com/Orange-Cyberdefense/glpwnme

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/SYRTI/POC_to_review

- https://github.com/StarCrossPortal/scalpel

- https://github.com/Threekiii/Awesome-POC

- https://github.com/WhooAmii/POC_to_review

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/allendemoura/CVE-2022-35914

- https://github.com/anonymous364872/Rapier_Tool

- https://github.com/apif-review/APIF_tool_2024

- https://github.com/apit-review-account/apit-tool

- https://github.com/atomicjjbod/mail_system

- https://github.com/btar1gan/exploit_CVE-2022-35914

- https://github.com/cobbbex/RedTeam

- https://github.com/cosad3s/CVE-2022-35914-poc

- https://github.com/cyb3r-w0lf/nuclei-template-collection

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/dravenww/curated-article

- https://github.com/franckferman/GLPI-htmLawed-CVE-2022_35914-PoC

- https://github.com/hktalent/Scan4all_Pro

- https://github.com/imthenachoman/How-To-Secure-A-Linux-Server

- https://github.com/joelindra/htmlawedchekcer

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/lolminerxmrig/Capricornus

- https://github.com/manas3c/CVE-POC

- https://github.com/nholuongut/secure-a-linux-server

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/noxlumens/CVE-2022-35914_poc

- https://github.com/reewardius/myown-nuclei-poc

- https://github.com/senderend/CVE-2022-35914

- https://github.com/soapffz/myown-nuclei-poc

- https://github.com/whoforget/CVE-POC

- https://github.com/xiaobaiakai/CVE-2022-35914

- https://github.com/youcans896768/APIV_Tool

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve