CVE-2022-39375
Cross-Site Scripting (XSS) through public RSS feed in GLPI
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to create a public RSS feed to inject malicious code in dashboards of other users. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
GLPI significa Gestionnaire Libre de Parc Informatique. GLPI es un paquete gratuito de software de gestión de TI y activos que proporciona funciones de ITIL Service Desk, seguimiento de licencias y auditoría de software. Los usuarios pueden crear una fuente RSS pública para inyectar código malicioso en los paneles de otros usuarios. Este problema ha sido solucionado; actualice a la versión 10.0.4. Actualmente no se conocen workarounds.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-09-02 CVE Reserved
- 2022-11-03 CVE Published
- 2024-05-26 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-fxcx-93fq-8r9g | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | >= 0.84 < 10.0.4 Search vendor "Glpi-project" for product "Glpi" and version " >= 0.84 < 10.0.4" | - |
Affected
|