Vulnerability Description
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Glpi-Project | Glpi | 10.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/glpi-project/glpi/commit/9a3c7487c8761eaa8f3b07589d6dcdfa5d1ePatchThird Party Advisory
- https://github.com/glpi-project/glpi/security/advisories/GHSA-33g2-m556-gccrThird Party Advisory
- https://github.com/glpi-project/glpi/commit/9a3c7487c8761eaa8f3b07589d6dcdfa5d1ePatchThird Party Advisory
- https://github.com/glpi-project/glpi/security/advisories/GHSA-33g2-m556-gccrThird Party Advisory
FAQ
What is CVE-2022-24876?
CVE-2022-24876 is a vulnerability with a CVSS score of 5.4 (MEDIUM). GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes ...
How severe is CVE-2022-24876?
CVE-2022-24876 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24876?
Check the references section above for vendor advisories and patch information. Affected products include: Glpi-Project Glpi.