First published: Fri Nov 15 2024(Updated: )
GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI | >=0.50<10.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41678 is categorized as a reflected XSS vulnerability, which can lead to session hijacking or other malicious actions.
To fix CVE-2024-41678, upgrade your GLPI software to version 10.0.17 or later.
CVE-2024-41678 affects all versions of GLPI prior to 10.0.17 that allow unauthenticated users to exploit the system.
The potential risks of CVE-2024-41678 include unauthorized access, data theft, and manipulation of application behavior through malicious scripts.
No, CVE-2024-41678 can be exploited by an unauthenticated user through malicious links.