GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo |
Mon, 18 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Glpi-project
Glpi-project glpi |
|
CPEs | cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* | |
Vendors & Products |
Glpi-project
Glpi-project glpi |
|
Metrics |
ssvc
|
Mon, 18 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue. | |
Title | GLPI vulnerable to enumeration of users' email addresses by unauthenticated user | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-18T18:34:01.203Z
Reserved: 2024-08-12T18:02:04.967Z
Link: CVE-2024-43416

Updated: 2024-11-18T18:33:57.082Z

Status : Analyzed
Published: 2024-11-18T17:15:11.220
Modified: 2025-01-07T17:05:20.757
Link: CVE-2024-43416

No data.