Vulnerability Description
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token for a Super-Admin. Using such token it is possible to negotiate a GLPI session and hijack the Super-Admin account, resulting in a Privilege Escalation. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Glpi-Project | Glpi | >= 0.83, < 9.5.13 |
Related Weaknesses (CWE)
References
- https://github.com/glpi-project/glpi/releases/tag/10.0.7PatchRelease Notes
- https://github.com/glpi-project/glpi/releases/tag/9.5.13PatchRelease Notes
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39Vendor Advisory
- https://github.com/glpi-project/glpi/releases/tag/10.0.7PatchRelease Notes
- https://github.com/glpi-project/glpi/releases/tag/9.5.13PatchRelease Notes
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39Vendor Advisory
FAQ
What is CVE-2023-28634?
CVE-2023-28634 is a vulnerability with a CVSS score of 8.8 (HIGH). GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token...
How severe is CVE-2023-28634?
CVE-2023-28634 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-28634?
Check the references section above for vendor advisories and patch information. Affected products include: Glpi-Project Glpi.