GLPI is a Free Asset and IT Management Software package. Versions 9.4.0 and above, prior to 10.0.6 are subject to Cross-site Scripting. An attacker can persuade a victim into opening a URL containing a payload exploiting this vulnerability. After exploited, the attacker can make actions as the victim or exfiltrate session cookies. This issue is patched in version 10.0.6.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c | Third Party Advisory |
https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
References | () https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c - Third Party Advisory |
Information
Published : 2023-01-26 21:18
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22722
Mitre link : CVE-2023-22722
CVE.ORG link : CVE-2023-22722
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')