First published: Mon Mar 18 2024(Updated: )
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI administrator in order to exploit a reflected XSS vulnerability. The XSS will only trigger if the administrator navigates through the debug bar. This issue has been patched in version 10.0.13.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI | >=10.0.8<10.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27914 is classified as a medium severity reflected XSS vulnerability.
To fix CVE-2024-27914, upgrade GLPI to version 10.0.13 or later.
CVE-2024-27914 affects GLPI versions from 10.0.8 to 10.0.12.
Yes, CVE-2024-27914 can be exploited by unauthenticated users through a malicious link.
CVE-2024-27914 allows attackers to execute malicious scripts in the context of a GLPI administrator's session.