First published: Fri Nov 15 2024(Updated: )
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can bypass the access control policy to create a private RSS feed attached to another user account and use a malicious payload to triggger a stored XSS. Upgrade to 10.0.17.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI | >=0.84<10.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45611 has a medium severity rating due to the potential for unauthorized access to user accounts.
To fix CVE-2024-45611, upgrade GLPI to version 10.0.18 or later, which addresses the vulnerability.
Authenticated users of GLPI versions prior to 10.0.18 can be affected by CVE-2024-45611.
CVE-2024-45611 is an access control vulnerability that allows users to create unauthorized private RSS feeds.
Yes, CVE-2024-45611 can potentially lead to data exposure by allowing maleficent users to access another user's resource.