Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-39276

Опубликовано: 03 нояб. 2022
Источник: debian
EPSS Низкий

Описание

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glpiremovedpackage

Примечания

  • https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p

  • https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/

  • Only supported behind an authenticated HTTP zone

EPSS

Процентиль: 28%
0.00097
Низкий

Связанные уязвимости

CVSS3: 3.5
ubuntu
больше 2 лет назад

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.

CVSS3: 3.5
nvd
больше 2 лет назад

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.

CVSS3: 5.3
fstec
больше 2 лет назад

Уязвимость системы работы с заявками и инцидентами GLPI, связанная c подделкой запросов на стороне сервера, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 9.8
redos
11 месяцев назад

Множественные уязвимости glpi

EPSS

Процентиль: 28%
0.00097
Низкий