Page 10 of 95 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue. • https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability. GLPI es un paquete de software gratuito de administración de activos y TI. versiones anteriores a 9.5.7, un administrador de entidades es capaz de recuperar datos normalmente inaccesibles por medio de una inyección SQL. • https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326 https://github.com/glpi-project/glpi/releases/tag/9.5.7 https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Version 9.5.7 contains a patch for this issue. There are no known workarounds. GLPI es un paquete de software gratuito de administración de activos y TI. • https://github.com/glpi-project/glpi/commit/e9b16bc8e9b61ebb2d35b96b9c71cd25c5af9e48 https://github.com/glpi-project/glpi/releases/tag/9.5.7 https://github.com/glpi-project/glpi/security/advisories/GHSA-6cj4-g839-gj5j • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, the cookie used to store the autologin cookie (when a user uses the "remember me" feature) is accessible by scripts. A malicious plugin that could steal this cookie would be able to use it to autologin. This issue is fixed in version 9.5.6. As a workaround, one may avoid using the "remember me" feature. • https://github.com/glpi-project/glpi/releases/tag/9.5.6 https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2 https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2 • CWE-732: Incorrect Permission Assignment for Critical Resource CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, a user who is logged in to GLPI can bypass Cross-Site Request Forgery (CSRF) protection in many places. This could allow a malicious actor to perform many actions on GLPI. This issue is fixed in version 9.5.6. There are no workarounds aside from upgrading. • https://github.com/glpi-project/glpi/releases/tag/9.5.6 https://github.com/glpi-project/glpi/security/advisories/GHSA-5qpf-32w7-c56p • CWE-352: Cross-Site Request Forgery (CSRF) •