CVE-2023-41888

GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The lack of path filtering on the GLPI URL may allow an attacker to transmit a malicious URL of login page that can be used to attempt a phishing attack on user credentials. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

29 Sep 2023, 18:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time Glpi-project
Glpi-project glpi
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
References (MISC) https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp - (MISC) https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp - Vendor Advisory

27 Sep 2023, 15:19

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 15:19

Updated : 2024-02-28 20:33


NVD link : CVE-2023-41888

Mitre link : CVE-2023-41888

CVE.ORG link : CVE-2023-41888


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')