First published: Wed Dec 11 2024(Updated: )
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.17, an unauthenticated user can retrieve all the sessions IDs and use them to steal any valid session. Version 10.0.17 contains a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI | >=9.5.0<10.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50339 is considered a critical vulnerability due to the potential for session hijacking by unauthenticated users.
To fix CVE-2024-50339, upgrade to GLPI version 10.0.17 or later, where the vulnerability has been patched.
CVE-2024-50339 affects all users of GLPI versions 9.5.0 to 10.0.16.
CVE-2024-50339 allows an attacker to retrieve session IDs and potentially hijack valid user sessions.
Yes, CVE-2024-50339 can be exploited remotely by unauthenticated users.