CVE-2024-50339

GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.17, an unauthenticated user can retrieve all the sessions IDs and use them to steal any valid session. Version 10.0.17 contains a patch for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

10 Jan 2025, 18:48

Type Values Removed Values Added
CWE CWE-384
First Time Glpi-project
Glpi-project glpi
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
References () https://github.com/glpi-project/glpi/releases/tag/10.0.17 - () https://github.com/glpi-project/glpi/releases/tag/10.0.17 - Release Notes
References () https://github.com/glpi-project/glpi/security/advisories/GHSA-v977-g4r9-6r72 - () https://github.com/glpi-project/glpi/security/advisories/GHSA-v977-g4r9-6r72 - Vendor Advisory

12 Dec 2024, 02:06

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:06

Updated : 2025-01-10 18:48


NVD link : CVE-2024-50339

Mitre link : CVE-2024-50339

CVE.ORG link : CVE-2024-50339


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-287

Improper Authentication

CWE-384

Session Fixation