First published: Tue May 05 2020(Updated: )
In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI | >=0.83.3<9.4.6 | |
Red Hat Fedora | =31 | |
Red Hat Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11035 has been classified as a medium severity vulnerability due to its potential impact on application security.
To fix CVE-2020-11035, upgrade GLPI to version 9.4.6 or later, which addresses the insecure CSRF token generation.
GLPI versions after 0.83.3 and before 9.4.6 are affected by CVE-2020-11035.
CVE-2020-11035 is a Cross-Site Request Forgery (CSRF) vulnerability caused by insecure token generation.
Yes, Fedora users should be aware of CVE-2020-11035 if they are using affected versions of GLPI.