Headline
CVE-2023-28632: Release 9.5.13 · glpi-project/glpi
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, an authenticated user can modify emails of any user, and can therefore takeover another user account through the “forgotten password” feature. By modifying emails, the user can also receive sensitive data through GLPI notifications. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, account takeover can be prevented by deactivating all notifications related to Forgotten password?
event. However, it will not prevent unauthorized modification of any user emails.
This release fixes several security issues that have been recently discovered. Update is recommended!
You can download the GLPI 9.5.13 archive on GitHub.
You will find below the list of security issues fixed in this bugfixes version:
- [SECURITY - High] Account takeover by authenticated user (CVE-2023-28632).
- [SECURITY - High] SQL injection through dynamic reports (CVE-2023-28838).
- [SECURITY - Moderate] Stored XSS through dashboard administration (CVE-2023-28852).
- [SECURITY - Moderate] Stored XSS on external links (CVE-2023-28636).
- [SECURITY - Moderate] Reflected XSS in search pages (CVE-2023-28639).
- [SECURITY - Moderate] Privilege Escalation from technician to super-admin (CVE-2023-28634).
- [SECURITY - Low] Blind Server-Side Request Forgery (SSRF) in RSS feeds (CVE-2023-28633).
Regards.
Related news
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.7, GLPI inventory endpoint can be used to drive a SQL injection attack. It can also be used to store malicious code that could be used to perform XSS attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.7 contains a patch for this issue. As a workaround, disable native inventory.