GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | Patch Release Notes |
https://github.com/glpi-project/glpi/releases/tag/9.5.13 | Patch Release Notes |
https://github.com/glpi-project/glpi/security/advisories/GHSA-r93q-chh5-jgh4 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-04-05 18:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-28639
Mitre link : CVE-2023-28639
CVE.ORG link : CVE-2023-28639
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')