Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-39376
HistoryNov 03, 2022 - 12:00 a.m.

CVE-2022-39376 Improper input validation on emails links in GLPI

2022-11-0300:00:00
CWE-20
GitHub_M
www.cve.org
cve-2022-39376
glpi
input validation
email links
itil service desk
software auditing
patch
upgrade
version 10.0.4
security issue

2.6 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

22.9%

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to inject custom fields values in mailto links. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.

CNA Affected

[
  {
    "vendor": "glpi-project",
    "product": "glpi",
    "versions": [
      {
        "version": ">= 0.65, < 10.0.4",
        "status": "affected"
      }
    ]
  }
]

2.6 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

22.9%

Related for CVELIST:CVE-2022-39376