First published: Thu Jan 26 2023(Updated: )
GLPI is a Free Asset and IT Management Software package. Versions prior to 9.5.12 and 10.0.6 are vulnerable to Improper Privilege Management. Any user having access to the standard interface can export data of almost any GLPI item type, even those on which user is not allowed to access (including assets, tickets, users, ...). This issue is patched in 10.0.6.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teclib GLPI | >=0.65<9.5.12 | |
Teclib GLPI | >=10.0.0<10.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23610 is a vulnerability in GLPI versions prior to 9.5.12 and 10.0.6 that allows any user to export data of almost any GLPI item type, even those on which the user is not allowed to access.
CVE-2023-23610 has a severity rating of 6.5, which is considered medium.
To fix CVE-2023-23610, users should update their GLPI software to version 9.5.12 or 10.0.6.
Improper Privilege Management is a vulnerability that allows users to have more privileges than intended, potentially leading to unauthorized access and data leakage.
More information about CVE-2023-23610 can be found at this link: https://github.com/glpi-project/glpi/security/advisories/GHSA-6565-hm87-24hf.