First published: Wed Sep 14 2022(Updated: )
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI | <10.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package.
GLPI provides ITIL Service Desk features, licenses tracking, and software auditing.
The vulnerability ID is CVE-2022-31143.
The severity of CVE-2022-31143 is medium with a CVSS score of 5.3.
The impact of CVE-2022-31143 is an exposure of private information defined in the setup of GLPI.
The affected software version is GLPI up to exclusive version 10.0.3.
To fix CVE-2022-31143, it is recommended to update GLPI to a version that includes the patch.
More information about CVE-2022-31143 can be found at the following references: [GitHub Commit](https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978) [GitHub Security Advisory](https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j)
The CWE ID of CVE-2022-31143 is 200.