First published: Mon Jul 15 2019(Updated: )
GLPI GLPI Product 9.3.1 is affected by: Cross Site Scripting (XSS). The impact is: All dropdown values are vulnerable to XSS leading to privilege escalation and executing js on admin. The component is: /glpi/ajax/getDropDownValue.php. The attack vector is: 1- User Create a ticket , 2- Admin opens another ticket and click on the "Link Tickets" feature, 3- a request to the endpoint fetches js and executes it.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
Teclib GLPI | =9.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010307 has a high severity due to its potential for privilege escalation through Cross Site Scripting (XSS).
To fix CVE-2019-1010307, update GLPI to version 9.4 or later, which addresses the XSS vulnerability.
CVE-2019-1010307 affects GLPI Product version 9.3.1 where all dropdown values are susceptible to XSS attacks.
CVE-2019-1010307 is a Cross Site Scripting (XSS) vulnerability that can lead to executing JavaScript code on the admin interface.
Users who create tickets in GLPI 9.3.1 can impact admins when they open tickets due to the potential for XSS attacks.