GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p | Third Party Advisory |
https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/ | Exploit Third Party Advisory |
https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p | Third Party Advisory |
https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p - Third Party Advisory | |
References | () https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.5 |
Information
Published : 2022-11-03 14:15
Updated : 2024-11-21 07:17
NVD link : CVE-2022-39276
Mitre link : CVE-2022-39276
CVE.ORG link : CVE-2022-39276
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-918
Server-Side Request Forgery (SSRF)