CVE-2023-28639

Source
https://cve.org/CVERecord?id=CVE-2023-28639
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28639.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-28639
Aliases
  • GHSA-r93q-chh5-jgh4
Downstream
Published
2023-04-05T00:00:00Z
Modified
2026-03-13T07:33:47.787361Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
GLPI vulnerable to reflected Cross-site Scripting in search pages
Details

GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/28xxx/CVE-2023-28639.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/glpi-project/glpi

Affected ranges

Type
GIT
Repo
https://github.com/glpi-project/glpi
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.85"
        },
        {
            "fixed": "0.85*"
        }
    ]
}
Type
GIT
Repo
https://github.com/glpi-project/glpi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "9.5.13"
        },
        {
            "last_affected": "10.0.7"
        }
    ]
}
Type
GIT
Repo
https://github.com/glpi-project/glpi
Events
Database specific
{
    "versions": [
        {
            "introduced": "10.0.0"
        },
        {
            "fixed": "10.0.0*"
        }
    ]
}

Affected versions

0.*
0.90
0.90-RC1
0.90-RC2
0.90-beta1
0.90-beta2
0.90.1
10.*
10.0.0
10.0.0-beta
10.0.0-rc1
10.0.0-rc2
10.0.0-rc3
10.0.1
10.0.2
10.0.3
10.0.4
10.0.5
10.0.6
10.0.7
9.*
9.1
9.1-RC1
9.1-RC2
9.3-beta
9.4.0
9.4.0-beta
9.4.0-rc1
9.4.0-rc2
9.4.1
9.4.1.1
9.4.2
9.4.3
9.4.4
9.4.5
9.4.6
9.5.0
9.5.0-rc1
9.5.0-rc2
9.5.1
9.5.10
9.5.11
9.5.12
9.5.13
9.5.2
9.5.3
9.5.4
9.5.5
9.5.6
9.5.7
9.5.8
9.5.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28639.json"