CVE-2021-21327: Remotely trigerring execution of your PHP objects in GLPI
Our team discovered a CVE in a popular open-source ITSM and Service Center software GLPI. The vulnerability allows to remotely trigger certain initialization code.
This network pentest type focuses on finding the following classes of vulnerabilities in your internal network:
Our detailed report outlines each issue identified with steps to reproduce, as well as how several issues could be chained in more powerful attacks.
External network pentest analyses your network exposure to external attackers on the Internet. It’s perfect to understand your risks of publicly facing services/hosts or DMZ networks.
Our detailed report outlines each issue identified with steps to reproduce, as well as how several issues could be chained in more powerful attacks.
During our pentests we rely on OWASP and OSSTM methodologies. While employing some automated tools and scanners, we mostly perform manual expert penetration testing: such an approach proves to be the most practically valuable.
While black-box is one of the options we provide, from the efficiency point of view, we lean toward grey-box type with a reasonable amount of input.
A kick-off meeting to agree on the scope, inputs and communication
Pentesting (2-4 weeks, depending on the scope)
The final report that highlights the identified vulnerabilities
Please contact us, and we will send you a sample network pentest report.
We will combine innovative pentest tactics and our experience to analyze your software for exploitable vulnerabilities and strengthen your security posture. Iterasec ensures:
By cooperating with Iterasec, you get compliance with PCI, HIPAA, SOC2,3, OWASP, and more, an independent evaluation of your software and infrastructure security, and increased software quality thanks to avoiding critical security vulnerabilities.
Please tell us what are you looking for and we will happily support you in that.
Feel free to use our contact form or contact us directly.