First published: Mon Nov 18 2024(Updated: )
GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI | >=0.80<10.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43416 is considered a medium severity vulnerability due to its potential for unauthorized information exposure.
To fix CVE-2024-43416, upgrade to GLPI version 10.0.17 or later, as it addresses the vulnerability.
CVE-2024-43416 affects all users of GLPI versions from 0.80 up to, but not including, 10.0.17.
CVE-2024-43416 is an information disclosure vulnerability that allows unauthenticated users to verify valid email addresses.
The impact of CVE-2024-43416 allows attackers to enumerate valid user email addresses, potentially leading to targeted phishing attacks.