CVE-2023-41321

GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

29 Sep 2023, 18:13

Type Values Removed Values Added
References (MISC) https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836 - (MISC) https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836 - Vendor Advisory
CWE CWE-200 NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
First Time Glpi-project
Glpi-project glpi

27 Sep 2023, 15:19

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 15:19

Updated : 2023-12-10 15:14


NVD link : CVE-2023-41321

Mitre link : CVE-2023-41321

CVE.ORG link : CVE-2023-41321


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor