Vulnerability Description
GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Glpi-Project | Glpi | >= 0.84, < 9.5.13 |
Related Weaknesses (CWE)
References
- https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621Patch
- https://github.com/glpi-project/glpi/releases/tag/10.0.7PatchRelease Notes
- https://github.com/glpi-project/glpi/releases/tag/9.5.13PatchRelease Notes
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwfVendor Advisory
- https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621Patch
- https://github.com/glpi-project/glpi/releases/tag/10.0.7PatchRelease Notes
- https://github.com/glpi-project/glpi/releases/tag/9.5.13PatchRelease Notes
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwfVendor Advisory
FAQ
What is CVE-2023-28633?
CVE-2023-28633 is a vulnerability with a CVSS score of 3.5 (LOW). GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case ...
How severe is CVE-2023-28633?
CVE-2023-28633 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-28633?
Check the references section above for vendor advisories and patch information. Affected products include: Glpi-Project Glpi.