First published: Wed Jan 25 2023(Updated: )
GLPI is a Free Asset and IT Management Software package. Versions 9.4.0 and above, prior to 10.0.6 are subject to Cross-site Scripting. An attacker can persuade a victim into opening a URL containing a payload exploiting this vulnerability. After exploited, the attacker can make actions as the victim or exfiltrate session cookies. This issue is patched in version 10.0.6.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI-PROJECT GLPI | >=9.4.0<9.5.12 | |
GLPI-PROJECT GLPI | >=10.0.0<10.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22722 is a vulnerability in GLPI, a Free Asset and IT Management Software package, that allows an attacker to perform cross-site scripting (XSS) attacks by persuading a victim to open a URL containing malicious code.
CVE-2023-22722 works by exploiting a vulnerability in GLPI versions 9.4.0 and above, prior to 10.0.6, which allows an attacker to inject malicious code into the victim's browser when they open a specially crafted URL.
The severity of CVE-2023-22722 is medium with a CVSS score of 6.1.
To fix CVE-2023-22722, it is recommended to upgrade GLPI to version 10.0.6 or above.
More information about CVE-2023-22722 can be found in the official GitHub security advisory of GLPI.