CVE-2023-28634

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28634
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28634.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-28634
Aliases
  • GHSA-4279-rxmh-gf39
Downstream
Published
2023-04-05T16:06:11.361Z
Modified
2025-11-29T14:11:02.665722Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
GLPI vulnerable to Privilege Escalation from Technician to Super-Admin
Details

GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token for a Super-Admin. Using such token it is possible to negotiate a GLPI session and hijack the Super-Admin account, resulting in a Privilege Escalation. Versions 9.5.13 and 10.0.7 contain a patch for this issue.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-285",
        "CWE-863"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/28xxx/CVE-2023-28634.json"
}
References

Affected packages

Git / github.com/glpi-project/glpi

Affected ranges

Type
GIT
Repo
https://github.com/glpi-project/glpi
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.83"
        },
        {
            "fixed": "9.5.13"
        }
    ]
}
Type
GIT
Repo
https://github.com/glpi-project/glpi
Events
Database specific
{
    "versions": [
        {
            "introduced": "10.0.0"
        },
        {
            "fixed": "10.0.7"
        }
    ]
}

Affected versions

10.*

10.0.0
10.0.1
10.0.2
10.0.3
10.0.4
10.0.5
10.0.6

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28634.json"