UBUNTU-CVE-2023-28632

Source
https://ubuntu.com/security/CVE-2023-28632
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28632.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-28632
Upstream
Published
2023-04-05T15:15:00Z
Modified
2025-10-24T05:01:54Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, an authenticated user can modify emails of any user, and can therefore takeover another user account through the "forgotten password" feature. By modifying emails, the user can also receive sensitive data through GLPI notifications. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, account takeover can be prevented by deactivating all notifications related to Forgotten password? event. However, it will not prevent unauthorized modification of any user emails.

References

Affected packages

Ubuntu:16.04:LTS / glpi

Package

Name
glpi
Purl
pkg:deb/ubuntu/glpi@0.84.8+dfsg.1-1ubuntu1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.84.8+dfsg.1-1
0.84.8+dfsg.1-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.84.8+dfsg.1-1ubuntu1",
            "binary_name": "glpi"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28632.json"