CVE-2024-50339

Source
https://cve.org/CVERecord?id=CVE-2024-50339
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50339.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-50339
Aliases
  • GHSA-v977-g4r9-6r72
Downstream
Published
2024-12-11T17:48:42.230Z
Modified
2026-04-10T05:18:09.116131Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
GLPI vulnerable to unauthenticated session hijacking
Details

GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.17, an unauthenticated user can retrieve all the sessions IDs and use them to steal any valid session. Version 10.0.17 contains a patch for this issue.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-287",
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50339.json"
}
References

Affected packages

Git / github.com/glpi-project/glpi

Affected ranges

Type
GIT
Repo
https://github.com/glpi-project/glpi
Events

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50339.json"