CVE-2024-43416

GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

07 Jan 2025, 17:05

Type Values Removed Values Added
References () https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d - () https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d - Patch
References () https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7 - () https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7 - Vendor Advisory
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
First Time Glpi-project
Glpi-project glpi
CWE NVD-CWE-noinfo

Information

Published : 2024-11-18 17:15

Updated : 2025-01-07 17:05


NVD link : CVE-2024-43416

Mitre link : CVE-2024-43416

CVE.ORG link : CVE-2024-43416


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo