A vulnerability was found in GLPI up to 10.0.17. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument redirect leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.0.18 is able to address this issue. It is recommended to upgrade the affected component.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/releases/tag/10.0.18 | Release Notes |
https://github.com/glpi-project/glpi/security/advisories/GHSA-g5fm-jq4j-c2c7 | Vendor Advisory |
https://vuldb.com/?ctiid.296809 | Permissions Required |
https://vuldb.com/?id.296809 | Permissions Required |
https://vuldb.com/?submit.451775 | Exploit Third Party Advisory |
Configurations
History
04 Mar 2025, 13:49
Type | Values Removed | Values Added |
---|---|---|
First Time |
Glpi-project glpi
Glpi-project |
|
CPE | cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/glpi-project/glpi/releases/tag/10.0.18 - Release Notes | |
References | () https://github.com/glpi-project/glpi/security/advisories/GHSA-g5fm-jq4j-c2c7 - Vendor Advisory | |
References | () https://vuldb.com/?ctiid.296809 - Permissions Required | |
References | () https://vuldb.com/?id.296809 - Permissions Required | |
References | () https://vuldb.com/?submit.451775 - Exploit, Third Party Advisory |
25 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-25 16:15
Updated : 2025-03-04 13:49
NVD link : CVE-2024-11955
Mitre link : CVE-2024-11955
CVE.ORG link : CVE-2024-11955
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')