An issue was discovered in GLPI through 9.2.1. The application is affected by XSS in the query string to front/preference.php. An attacker is able to create a malicious URL that, if opened by an authenticated user with debug privilege, will execute JavaScript code supplied by the attacker. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/pull/3647 | Issue Tracking Third Party Advisory |
https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ | Permissions Required |
https://github.com/glpi-project/glpi/pull/3647 | Issue Tracking Third Party Advisory |
https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ | Permissions Required |
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/glpi-project/glpi/pull/3647 - Issue Tracking, Third Party Advisory | |
References | () https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ - Permissions Required |
Information
Published : 2018-03-12 21:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7563
Mitre link : CVE-2018-7563
CVE.ORG link : CVE-2018-7563
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')