Vulnerability Description
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Information associated to registration key are not properly escaped in registration key configuration page. They can be used to steal a GLPI administrator cookie. Users are advised to upgrade to 10.0.3. There are no known workarounds for this issue. ### Workarounds Do not use a registration key created by an untrusted person.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Glpi-Project | Glpi | < 10.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ePatchThird Party Advisory
- https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5Third Party Advisory
- https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ePatchThird Party Advisory
- https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5Third Party Advisory
FAQ
What is CVE-2022-35945?
CVE-2022-35945 is a vulnerability with a CVSS score of 6.3 (MEDIUM). GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Infor...
How severe is CVE-2022-35945?
CVE-2022-35945 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-35945?
Check the references section above for vendor advisories and patch information. Affected products include: Glpi-Project Glpi.