Lucene search

K
freebsdFreeBSD54E5573A-6834-11EE-B06F-0050569CEB3A
HistorySep 27, 2023 - 12:00 a.m.

Phishing through a login page malicious URL in GLPI

2023-09-2700:00:00
vuxml.freebsd.org
6
phishing
glpi
login page
security advisory
url
upgrade
unix

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

7.2 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.6%

[email protected] reports:

GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
Asset and IT Management Software package, that provides ITIL Service
Desk features, licenses tracking and software auditing. The lack
of path filtering on the GLPI URL may allow an attacker to transmit
a malicious URL of login page that can be used to attempt a phishing
attack on user credentials. Users are advised to upgrade to version
10.0.10. There are no known workarounds for this vulnerability.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchglpi= 10.0.8,1UNKNOWN
FreeBSDanynoarchglpi< 10.0.10,1UNKNOWN

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

7.2 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.6%

Related for 54E5573A-6834-11EE-B06F-0050569CEB3A