UBUNTU-CVE-2024-43416

Source
https://ubuntu.com/security/CVE-2024-43416
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-43416.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-43416
Related
Published
2024-11-18T17:15:00Z
Modified
2024-11-20T12:26:15Z
Summary
[none]
Details

GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.

References

Affected packages

Ubuntu:Pro:16.04:LTS / glpi

Package

Name
glpi
Purl
pkg:deb/ubuntu/glpi?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.84.8+dfsg.1-1
0.84.8+dfsg.1-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}