MGASA-2018-0272

Source
https://advisories.mageia.org/MGASA-2018-0272.html
Import Source
https://advisories.mageia.org/MGASA-2018-0272.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0272
Related
Published
2018-06-05T21:42:18Z
Modified
2018-06-05T21:25:15Z
Summary
Updated glpi packages fix security vulnerability
Details

Updated glpi package fixes security vulnerability:

An issue was discovered in GLPI through 9.2.1. The application is affected by XSS in the query string to front/preference.php. An attacker is able to create a malicious URL that, if opened by an authenticated user with debug privilege, will execute JavaScript code supplied by the attacker. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes (CVE-2018-7563).

References
Credits

Affected packages

Mageia:6 / glpi

Package

Name
glpi
Purl
pkg:rpm/mageia/glpi?arch=source&distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.1.6-2.1.mga6

Ecosystem specific

{
    "section": "core"
}