PT-2024-2326 · Glpi+2 · Glpi+2

Borelenzo

·

Published

2022-09-15

·

Updated

2025-01-02

·

CVE-2024-27930

CVSS v2.0

6.8

Medium

AV:N/AC:L/Au:S/C:C/I:N/A:N
Name of the Vulnerable Software and Affected Versions GLPI versions prior to 10.0.13
Description The issue is related to insufficient authorization procedure in GLPI, a free asset and IT management software package. This allows an authenticated user to access sensitive fields data from items on which they have read access. The vulnerability can be exploited by a remote attacker to gain unauthorized access to protected information.
Recommendations For versions prior to 10.0.13, update to version 10.0.13 to resolve the issue. As a temporary workaround, consider restricting access to sensitive fields data to minimize the risk of exploitation.

Exploit

Fix

Improper Authorization

Weakness Enumeration

Related Identifiers

ALT-PU-2022-2614
ALT-PU-2022-2624
ALT-PU-2022-2665
ALT-PU-2023-7633
ALT-PU-2024-4487
ALT-PU-2024-4750
ALT-PU-2024-8030
ALT-PU-2024-8094
BDU:2024-02268
CVE-2024-27930
GHSA-82VV-J9PR-QMWQ

Affected Products

Alt Linux
Glpi
Red Os