GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.17, an unauthenticated user can retrieve all the sessions IDs and use them to steal any valid session. Version 10.0.17 contains a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/releases/tag/10.0.17 | Release Notes |
https://github.com/glpi-project/glpi/security/advisories/GHSA-v977-g4r9-6r72 | Vendor Advisory |
Configurations
History
10 Jan 2025, 18:48
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-384 | |
References | () https://github.com/glpi-project/glpi/releases/tag/10.0.17 - Release Notes | |
References | () https://github.com/glpi-project/glpi/security/advisories/GHSA-v977-g4r9-6r72 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Glpi-project
Glpi-project glpi |
|
CPE | cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* | |
Summary |
|
12 Dec 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-12 02:06
Updated : 2025-01-10 18:48
NVD link : CVE-2024-50339
Mitre link : CVE-2024-50339
CVE.ORG link : CVE-2024-50339
JSON object : View
Products Affected
glpi-project
- glpi