GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Information associated to registration key are not properly escaped in registration key configuration page. They can be used to steal a GLPI administrator cookie. Users are advised to upgrade to 10.0.3. There are no known workarounds for this issue. ### Workarounds Do not use a registration key created by an untrusted person.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a | Patch Third Party Advisory |
https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5 | Third Party Advisory |
https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a | Patch Third Party Advisory |
https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-09-14 18:15
Updated : 2024-11-21 07:12
NVD link : CVE-2022-35945
Mitre link : CVE-2022-35945
CVE.ORG link : CVE-2022-35945
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')