First published: Thu Apr 25 2024(Updated: )
The GLPI Agent is a generic management agent. Prior to version 1.7.2, a local user can modify GLPI-Agent code or used DLLs to modify agent logic and even gain higher privileges. Users should upgrade to GLPI-Agent 1.7.2 to receive a patch. As a workaround, use the default installation folder which involves installed folder is automatically secured by the system.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
<1.7.2 | ||
GLPI Agent | <1.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28241 has been rated as a medium severity vulnerability due to the potential for local users to modify the GLPI Agent code.
To fix CVE-2024-28241, users should upgrade to GLPI-Agent version 1.7.2 or later.
CVE-2024-28241 affects all versions of GLPI-Agent prior to 1.7.2.
An attacker with local access could modify GLPI-Agent code or DLLs to change agent functionality or escalate privileges.
As a temporary measure, users can utilize the default installation settings until they can upgrade.