Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-39276
HistoryNov 03, 2022 - 12:00 a.m.

CVE-2022-39276 Blind Server-Side Request Forgery (SSRF) in RSS feeds and planning

2022-11-0300:00:00
CWE-918
GitHub_M
www.cve.org
cve-2022-39276
ssrf
rss feeds
glpi
planning
itil service desk
redirect response
url allow list
administrator
patch
upgrade
10.0.4

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

30.1%

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.

CNA Affected

[
  {
    "vendor": "glpi-project",
    "product": "glpi",
    "versions": [
      {
        "version": "< 10.0.4",
        "status": "affected"
      }
    ]
  }
]

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

30.1%

Related for CVELIST:CVE-2022-39276