{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "fixed": "4.0.2"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "5437b7b5cb95047b34abd6ef6fcc1b6ce5a646fe"
            }
          ],
          "repo": "https://github.com/infotelglpi/manageentities",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "The Managentities plugin before 4.0.2 for GLPI allows reading local files via directory traversal in the inc/cri.class.php file parameter.",
  "id": "CVE-2022-34127",
  "modified": "2026-03-15T21:45:25.677826166Z",
  "published": "2023-04-16T03:15:07.370Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/InfotelGLPI/manageentities/security/advisories/GHSA-4hpg-m8fv-xv3h"
    },
    {
      "type": "ADVISORY",
      "url": "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/InfotelGLPI/manageentities/releases/tag/4.0.2"
    }
  ],
  "related": [
    "GHSA-4hpg-m8fv-xv3h"
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    }
  ]
}