PT-2024-2326 · Glpi+2 · Glpi+2
Borelenzo
·
Published
2022-09-15
·
Updated
2025-01-02
·
CVE-2024-27930
CVSS v2.0
6.8
Medium
| AV:N/AC:L/Au:S/C:C/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
GLPI versions prior to 10.0.13
Description
The issue is related to insufficient authorization procedure in GLPI, a free asset and IT management software package. This allows an authenticated user to access sensitive fields data from items on which they have read access. The vulnerability can be exploited by a remote attacker to gain unauthorized access to protected information.
Recommendations
For versions prior to 10.0.13, update to version 10.0.13 to resolve the issue. As a temporary workaround, consider restricting access to sensitive fields data to minimize the risk of exploitation.
Exploit
Fix
Improper Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Glpi
Red Os