2024-11-18 19:03:31 +00:00
{
"id" : "CVE-2024-43416" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2024-11-18T17:15:11.220" ,
2025-01-07 19:03:59 +00:00
"lastModified" : "2025-01-07T17:05:20.757" ,
"vulnStatus" : "Analyzed" ,
2024-11-18 19:03:31 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue."
2024-11-19 23:03:24 +00:00
} ,
{
"lang" : "es" ,
"value" : "GLPI es un paquete de software gratuito de gesti\u00f3n de activos y TI. A partir de la versi\u00f3n 0.80 y antes de la versi\u00f3n 10.0.17, un usuario no autenticado puede usar un endpoint de la aplicaci\u00f3n para verificar si una direcci\u00f3n de correo electr\u00f3nico corresponde a un usuario v\u00e1lido de GLPI. La versi\u00f3n 10.0.17 soluciona el problema."
2024-11-18 19:03:31 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2024-11-18 19:03:31 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-11-18 19:03:31 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
2025-01-07 19:03:59 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
2024-11-18 19:03:31 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-11-18 19:03:31 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-200"
}
]
2025-01-07 19:03:59 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "0.80" ,
"versionEndExcluding" : "10.0.17" ,
"matchCriteriaId" : "32ABC28B-4FBB-4935-84A6-099E9F11B796"
}
]
}
]
2024-11-18 19:03:31 +00:00
}
] ,
"references" : [
{
"url" : "https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d" ,
2025-01-07 19:03:59 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2024-11-18 19:03:31 +00:00
} ,
{
"url" : "https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7" ,
2025-01-07 19:03:59 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
2024-11-18 19:03:31 +00:00
}
]
}