1385 lines
86 KiB
JSON
1385 lines
86 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20248030",
|
||
"Version": "oval:org.altlinux.errata:def:20248030",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2024-8030: package `glpi` update to version 10.0.15-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2024-8030",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-8030",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04910",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04910",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03380",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03380",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03381",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03381",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03382",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03382",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03385",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03385",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03386",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03386",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03387",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03387",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03388",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03388",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03389",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03389",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04089",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04089",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04090",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04090",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04591",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04591",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04593",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04593",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07695",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07695",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07696",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07696",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07698",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07698",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07701",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07701",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07843",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07843",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07847",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07847",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07849",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07849",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07850",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07850",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-07851",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-07851",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-09029",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-09029",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-09030",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-09030",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-02142",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-02142",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-02266",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-02266",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-02268",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-02268",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-02422",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-02422",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-03309",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-03309",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-03510",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-03510",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24867",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24867",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24868",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24868",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31056",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31056",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31061",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31061",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31068",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31068",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31143",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31143",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-31187",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31187",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-35914",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-35914",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-35945",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-35945",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-35946",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-35946",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-35947",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-35947",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36112",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36112",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39234",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39234",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39262",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39262",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39276",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39276",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39277",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39277",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39323",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39323",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39370",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39370",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39371",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39371",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39372",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39372",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39373",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39373",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39375",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39375",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39376",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39376",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41941",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41941",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22500",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22500",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22722",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22722",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22724",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22724",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22725",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22725",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23610",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23610",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28632",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28632",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28633",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28633",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28634",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28634",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28636",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28636",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28639",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28639",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28838",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28838",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28849",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28849",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28852",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28852",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-34106",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34106",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-34107",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34107",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-34244",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34244",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-35924",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35924",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-35939",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35939",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-35940",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35940",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-36808",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-36808",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-37278",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37278",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-41320",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-41320",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-41321",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-41321",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-41322",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-41322",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-41323",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-41323",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-41324",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-41324",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-41326",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-41326",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-41888",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-41888",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-42461",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-42461",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-42462",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-42462",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-42802",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-42802",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-43813",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-43813",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-46726",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46726",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-46727",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46727",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-51446",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-51446",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-23645",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-23645",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-27096",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-27096",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-27098",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-27098",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-27104",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-27104",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-27914",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-27914",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-27930",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-27930",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-27937",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-27937",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-29889",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-29889",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-31456",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-31456",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades glpi to version 10.0.15-alt1. \nSecurity Fix(es):\n\n * BDU:2022-04910: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки\n\n * BDU:2023-03380: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной авторизацией, позволяющая нарушителю повышать привилегии внутри приложения\n\n * BDU:2023-03381: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильным управлением привилегиями, позволяющая нарушителю повышать привилегии внутри приложения\n\n * BDU:2023-03382: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с подделкой запроса на стороне сервера, позволяющая нарушителю выполнять SSRF-атаки\n\n * BDU:2023-03385: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией ввода во время генерации веб-страницы, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных.\n\n * BDU:2023-03386: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией входных данных во время генерации веб-страницы и неправильной нейтрализацией специальных элементов, используемых в команде SQL, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных\n\n * BDU:2023-03387: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией специальных элементов, используемых в команде SQL, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных\n\n * BDU:2023-03388: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией входных данных во время генерации веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев\n\n * BDU:2023-03389: Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией ввода во время генерации веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев\n\n * BDU:2023-04089: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с недостатками процедуры аутентификации, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2023-04090: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с недостатками контроля доступа, позволяющая нарушителю изменять или просматривать данные панели управления\n\n * BDU:2023-04591: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-04593: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-07695: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с раскрытием информации позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2023-07696: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с некорректной нейтрализацией специальных элементов, используемых в SQL-командах, позволяющая нарушителю захватить учетную запись администратора\n\n * BDU:2023-07698: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ над учетной записью другого пользователя\n\n * BDU:2023-07701: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с раскрытием информации позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2023-07843: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить несанкционированный доступ к учетной записью произвольного пользователя\n\n * BDU:2023-07847: Уязвимость функции Kanban системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, позволяющая нарушителю получить несанкционированный доступ к учетной записью произвольного пользователя\n\n * BDU:2023-07849: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом при обработке параметра URL, позволяющая нарушителю выполнить фишинговые атаки на учетные данные пользователя\n\n * BDU:2023-07850: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная использованием поля ввода субъектов ITIL из формы заявки, позволяющая нарушителю захватить учетную запись администратора\n\n * BDU:2023-07851: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с неограниченной загрузкой файлов опасного типа, позволяющая нарушителю загрузить произвольные файлы в систему\n\n * BDU:2023-09029: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с некорректной нейтрализацией специальных элементов, используемых в SQL-командах, позволяющая нарушителю измененить логику запроса к базе данных путем внедрения произвольных операторов SQL\n\n * BDU:2023-09030: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с неверной нейтрализация особых элементов в выходных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-02142: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный SQL-код\n\n * BDU:2024-02266: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-02268: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с недостатками процедуры авторизации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2024-02422: Уязвимость программного обеспечения для управления активами и центрами обработки данных GLPI, связанная с недостаточной защитой структуры SQL-запросов, позволяющая нарушителю выполнить произвольные SQL-запросы\n\n * BDU:2024-03309: Уязвимость системы заявок, инцидентов и инвентаризации компьютерного оборудования GLPI, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю выполнять произвольные SQL-запросы\n\n * BDU:2024-03510: Уязвимость системы работы с заявками и инцидентами GLPI, связанная c неправильной нейтрализацией ввода во время создания веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)\n\n * CVE-2022-24867: GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.\n\n * CVE-2022-24868: GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars.\n\n * CVE-2022-31056: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.\n\n * CVE-2022-31061: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.\n\n * CVE-2022-31068: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade.\n\n * CVE-2022-31143: GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.\n\n * CVE-2022-31187: GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions were found to not properly neutralize HTML tags in the global search context. Users are advised to upgrade to version 10.0.3 to resolve this issue. Users unable to upgrade should disable global search.\n\n * CVE-2022-35914: /vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.\n\n * CVE-2022-35945: GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Information associated to registration key are not properly escaped in registration key configuration page. They can be used to steal a GLPI administrator cookie. Users are advised to upgrade to 10.0.3. There are no known workarounds for this issue. ### Workarounds Do not use a registration key created by an untrusted person.\n\n * CVE-2022-35946: GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have \"General setup\" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script.\n\n * CVE-2022-35947: GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions have been found to be vulnerable to a SQL injection attack which an attacker could leverage to simulate an arbitrary user login. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should disable the `Enable login with external token` API configuration.\n\n * CVE-2022-36112: GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or extenal calendar in planning is subject to SSRF exploit. Server-side requests can be used to scan server port or services opened on GLPI server or its private network. Queries responses are not exposed to end-user (blind SSRF). Users are advised to upgrade to version 10.0.3 to resolve this issue. There are no known workarounds.\n\n * CVE-2022-39234: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Deleted/deactivated user could continue to use their account as long as its cookie is valid. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.\n\n * CVE-2022-39262: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package, GLPI administrator can define rich-text content to be displayed on login page. The displayed content is can contains malicious code that can be used to steal credentials. This issue has been patched, please upgrade to version 10.0.4.\n\n * CVE-2022-39276: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds.\n\n * CVE-2022-39277: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. External links are not properly sanitized and can therefore be used for a Cross-Site Scripting (XSS) attack. This issue has been patched, please upgrade to GLPI 10.0.4. There are currently no known workarounds.\n\n * CVE-2022-39323: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Time based attack using a SQL injection in api REST user_token. This issue has been patched, please upgrade to version 10.0.4. As a workaround, disable login with user_token on API Rest.\n\n * CVE-2022-39370: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Connected users may gain access to debug panel through the GLPI update script. This issue has been patched, please upgrade to 10.0.4. As a workaround, delete the `install/update.php` script.\n\n * CVE-2022-39371: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Script related HTML tags in assets inventory information are not properly neutralized. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.\n\n * CVE-2022-39372: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.\n\n * CVE-2022-39373: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, please upgrade to version 10.0.4.\n\n * CVE-2022-39375: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to create a public RSS feed to inject malicious code in dashboards of other users. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.\n\n * CVE-2022-39376: GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to inject custom fields values in `mailto` links. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.\n\n * CVE-2022-41941: GLPI is a Free Asset and IT Management Software package. Versions 10.0.0 and above, prior to 10.0.6, are subject to Cross-site Scripting. An administrator may store malicious code in help links. This issue is patched in 10.0.6.\n\n * CVE-2023-22500: GLPI is a Free Asset and IT Management Software package. Versions 10.0.0 and above, prior to 10.0.6 are vulnerable to Incorrect Authorization. This vulnerability allow unauthorized access to inventory files. Thus, if anonymous access to FAQ is allowed, inventory files are accessbile by unauthenticated users. This issue is patched in version 10.0.6. As a workaround, disable native inventory and delete inventory files from server (default location is `files/_inventory`).\n\n * CVE-2023-22722: GLPI is a Free Asset and IT Management Software package. Versions 9.4.0 and above, prior to 10.0.6 are subject to Cross-site Scripting. An attacker can persuade a victim into opening a URL containing a payload exploiting this vulnerability. After exploited, the attacker can make actions as the victim or exfiltrate session cookies. This issue is patched in version 10.0.6.\n\n * CVE-2023-22724: GLPI is a Free Asset and IT Management Software package. Versions prior to 10.0.6 are subject to Cross-site Scripting via malicious RSS feeds. An Administrator can import a malicious RSS feed that contains Cross Site Scripting (XSS) payloads inside RSS links. Victims who wish to visit an RSS content and click on the link will execute the Javascript. This issue is patched in 10.0.6.\n\n\n * CVE-2023-22725: GLPI is a Free Asset and IT Management Software package. Versions 0.6.0 and above, prior to 10.0.6 are vulnerable to Cross-site Scripting. This vulnerability allow for an administrator to create a malicious external link. This issue is patched in 10.0.6.\n\n * CVE-2023-23610: GLPI is a Free Asset and IT Management Software package. Versions prior to 9.5.12 and 10.0.6 are vulnerable to Improper Privilege Management. Any user having access to the standard interface can export data of almost any GLPI item type, even those on which user is not allowed to access (including assets, tickets, users, ...). This issue is patched in 10.0.6.\n\n * CVE-2023-28632: GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, an authenticated user can modify emails of any user, and can therefore takeover another user account through the \"forgotten password\" feature. By modifying emails, the user can also receive sensitive data through GLPI notifications. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, account takeover can be prevented by deactivating all notifications related to `Forgotten password?` event. However, it will not prevent unauthorized modification of any user emails.\n\n * CVE-2023-28633: GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.\n\n * CVE-2023-28634: GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token for a Super-Admin. Using such token it is possible to negotiate a GLPI session and hijack the Super-Admin account, resulting in a Privilege Escalation. Versions 9.5.13 and 10.0.7 contain a patch for this issue.\n\n * CVE-2023-28636: GLPI is a free asset and IT management software package. Starting in version 0.60 and prior to versions 9.5.13 and 10.0.7, a vulnerability allows an administrator to create a malicious external link. This issue is fixed in versions 9.5.13 and 10.0.7.\n\n * CVE-2023-28639: GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7.\n\n * CVE-2023-28838: GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance \u003e Statistics` and `Tools \u003e Reports` read rights from every user.\n\n * CVE-2023-28849: GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.7, GLPI inventory endpoint can be used to drive a SQL injection attack. It can also be used to store malicious code that could be used to perform XSS attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.7 contains a patch for this issue. As a workaround, disable native inventory.\n\n * CVE-2023-28852: GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to versions 9.5.13 and 10.0.7, a user with dashboard administration rights may hack the dashboard form to store malicious code that will be executed when other users will use the related dashboard. Versions 9.5.13 and 10.0.7 contain a patch for this issue.\n\n * CVE-2023-34106: GLPI is a free asset and IT management software package. Versions of the software starting with 0.68 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user. This allows access to the list of all users and their personal information. Users should upgrade to version 10.0.8 to receive a patch.\n\n * CVE-2023-34107: GLPI is a free asset and IT management software package. Versions of the software starting with 9.2.0 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user, allows access to the view all KnowbaseItems. Version 10.0.8 has a patch for this issue.\n\n * CVE-2023-34244: GLPI is a free asset and IT management software package. Starting in version 9.4.0 and prior to version 10.0.8, a malicious link can be crafted by an unauthenticated user that can exploit a reflected XSS in case any authenticated user opens the crafted link. Users should upgrade to version 10.0.8 to receive a patch.\n\n * CVE-2023-35924: GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.8, GLPI inventory endpoint can be used to drive a SQL injection attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory.\n\n * CVE-2023-35939: GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a on a file accessible by an authenticated user (or not for certain actions), allows a threat actor to interact, modify, or see Dashboard data. Version 10.0.8 contains a patch for this issue.\n\n * CVE-2023-35940: GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue.\n\n * CVE-2023-36808: GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.8, Computer Virtual Machine form and GLPI inventory request can be used to perform a SQL injection attack. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory.\n\n * CVE-2023-37278: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An administrator can trigger SQL injection via dashboards administration. This vulnerability has been patched in version 10.0.9.\n\n\n\n * CVE-2023-41320: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.\n\n * CVE-2023-41321: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.\n\n * CVE-2023-41322: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability.\n\n * CVE-2023-41323: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.\n\n * CVE-2023-41324: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user that have read access on users resource can steal accounts of other users. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.\n\n * CVE-2023-41326: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.\n\n * CVE-2023-41888: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The lack of path filtering on the GLPI URL may allow an attacker to transmit a malicious URL of login page that can be used to attempt a phishing attack on user credentials. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.\n\n * CVE-2023-42461: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The ITIL actors input field from the Ticket form can be used to perform a SQL injection. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.\n\n * CVE-2023-42462: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The document upload process can be diverted to delete some files. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.\n\n * CVE-2023-42802: GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server.\n\n * CVE-2023-43813: GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, the saved search feature can be used to perform a SQL injection. Version 10.0.11 contains a patch for the issue.\n\n * CVE-2023-46726: GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, on PHP 7.4 only, the LDAP server configuration form can be used to execute arbitrary code previously uploaded as a GLPI document. Version 10.0.11 contains a patch for the issue.\n\n * CVE-2023-46727: GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, GLPI inventory endpoint can be used to drive a SQL injection attack. Version 10.0.11 contains a patch for the issue. As a workaround, disable native inventory.\n\n * CVE-2023-51446: GLPI is a Free Asset and IT Management Software package. When authentication is made against a LDAP, the authentication form can be used to perform LDAP injection. Upgrade to 10.0.12.\n\n * CVE-2024-23645: GLPI is a Free Asset and IT Management Software package. A malicious URL can be used to execute XSS on reports pages. Upgrade to 10.0.12.\n\n\n * CVE-2024-27096: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can exploit a SQL injection vulnerability in the search engine to extract data from the database. This issue has been patched in version 10.0.13.\n\n * CVE-2024-27098: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can execute a SSRF based attack using Arbitrary Object Instantiation. This issue has been patched in version 10.0.13.\n\n * CVE-2024-27104: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. A user with rights to create and share dashboards can build a dashboard containing javascript code. Any user that will open this dashboard will be subject to an XSS attack. This issue has been patched in version 10.0.13.\n\n\n * CVE-2024-27914: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI administrator in order to exploit a reflected XSS vulnerability. The XSS will only trigger if the administrator navigates through the debug bar. This issue has been patched in version 10.0.13.\n\n\n * CVE-2024-27930: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can access sensitive fields data from items on which he has read access. This issue has been patched in version 10.0.13.\n\n * CVE-2024-27937: GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can obtain the email address of all GLPI users. This issue has been patched in version 10.0.13.\n\n\n * CVE-2024-29889: GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability in the saved searches feature to alter another user account data take control of it. This vulnerability is fixed in 10.0.15.\n\n * CVE-2024-31456: GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability from map search. This vulnerability is fixed in 10.0.15.\n\n * #48856: Ошибка \"a2enmode: команда не найдена\" при установке",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2024-05-22"
|
||
},
|
||
"Updated": {
|
||
"Date": "2024-05-22"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-04910",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04910",
|
||
"Impact": "Critical",
|
||
"Public": "20220628"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03380",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-285, CWE-863",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03380",
|
||
"Impact": "High",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03381",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03381",
|
||
"Impact": "High",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03382",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||
"CWE": "CWE-918",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03382",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03385",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03385",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03386",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
|
||
"CWE": "CWE-79, CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03386",
|
||
"Impact": "Critical",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03387",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03387",
|
||
"Impact": "High",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03388",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03388",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03389",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03389",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04089",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-284, CWE-287, CWE-862",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04089",
|
||
"Impact": "High",
|
||
"Public": "20230507"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04090",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-284, CWE-863",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04090",
|
||
"Impact": "High",
|
||
"Public": "20230507"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04591",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04591",
|
||
"Impact": "High",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04593",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04593",
|
||
"Impact": "Critical",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07695",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07695",
|
||
"Impact": "Low",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07696",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07696",
|
||
"Impact": "Critical",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07698",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264, CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07698",
|
||
"Impact": "High",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07701",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07701",
|
||
"Impact": "Low",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07843",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07843",
|
||
"Impact": "High",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07847",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07847",
|
||
"Impact": "High",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07849",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-22",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07849",
|
||
"Impact": "Low",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07850",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07850",
|
||
"Impact": "Critical",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-07851",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "CWE-22, CWE-434",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-07851",
|
||
"Impact": "Critical",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-09029",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-09029",
|
||
"Impact": "Critical",
|
||
"Public": "20231213"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-09030",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-09030",
|
||
"Impact": "Critical",
|
||
"Public": "20231213"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-02142",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-02142",
|
||
"Impact": "High",
|
||
"Public": "20240313"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-02266",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-02266",
|
||
"Impact": "High",
|
||
"Public": "20231213"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-02268",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-285",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-02268",
|
||
"Impact": "Low",
|
||
"Public": "20240313"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-02422",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-02422",
|
||
"Impact": "Critical",
|
||
"Public": "20230713"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-03309",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-03309",
|
||
"Impact": "Critical",
|
||
"Public": "20240424"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-03510",
|
||
"CVSS": "AV:N/AC:L/Au:M/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-03510",
|
||
"Impact": "Low",
|
||
"Public": "20240318"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2022-24867",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-522",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24867",
|
||
"Impact": "High",
|
||
"Public": "20220421"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24868",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24868",
|
||
"Impact": "Low",
|
||
"Public": "20220421"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31056",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31056",
|
||
"Impact": "Critical",
|
||
"Public": "20220628"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31061",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31061",
|
||
"Impact": "Critical",
|
||
"Public": "20220628"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31068",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31068",
|
||
"Impact": "Low",
|
||
"Public": "20220628"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31143",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31143",
|
||
"Impact": "Low",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-31187",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31187",
|
||
"Impact": "Low",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-35914",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-35914",
|
||
"Impact": "Critical",
|
||
"Public": "20220919"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-35945",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-35945",
|
||
"Impact": "Low",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-35946",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-35946",
|
||
"Impact": "Low",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-35947",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-35947",
|
||
"Impact": "Critical",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36112",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||
"CWE": "CWE-918",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36112",
|
||
"Impact": "Low",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39234",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-613",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39234",
|
||
"Impact": "High",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39262",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39262",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39276",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-918",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39276",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39277",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39277",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39323",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39323",
|
||
"Impact": "Critical",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39370",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39370",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39371",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39371",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39372",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39372",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39373",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39373",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39375",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39375",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39376",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39376",
|
||
"Impact": "Low",
|
||
"Public": "20221103"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41941",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41941",
|
||
"Impact": "Low",
|
||
"Public": "20230126"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22500",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22500",
|
||
"Impact": "High",
|
||
"Public": "20230126"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22722",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22722",
|
||
"Impact": "Low",
|
||
"Public": "20230126"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22724",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22724",
|
||
"Impact": "Low",
|
||
"Public": "20230126"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22725",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22725",
|
||
"Impact": "Low",
|
||
"Public": "20230126"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23610",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23610",
|
||
"Impact": "Low",
|
||
"Public": "20230126"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28632",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28632",
|
||
"Impact": "High",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28633",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-918",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28633",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28634",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-285",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28634",
|
||
"Impact": "High",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28636",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28636",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28639",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28639",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28838",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28838",
|
||
"Impact": "High",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28849",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28849",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28852",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28852",
|
||
"Impact": "Low",
|
||
"Public": "20230405"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-34106",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34106",
|
||
"Impact": "Low",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-34107",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34107",
|
||
"Impact": "Low",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-34244",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34244",
|
||
"Impact": "Low",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-35924",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35924",
|
||
"Impact": "Critical",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-35939",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35939",
|
||
"Impact": "High",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-35940",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35940",
|
||
"Impact": "High",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-36808",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-36808",
|
||
"Impact": "Critical",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-37278",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37278",
|
||
"Impact": "Critical",
|
||
"Public": "20230713"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-41320",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-41320",
|
||
"Impact": "Critical",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-41321",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-41321",
|
||
"Impact": "Low",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-41322",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-41322",
|
||
"Impact": "High",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-41323",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-41323",
|
||
"Impact": "Low",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-41324",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-41324",
|
||
"Impact": "High",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-41326",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-41326",
|
||
"Impact": "High",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-41888",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-22",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-41888",
|
||
"Impact": "Low",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-42461",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-42461",
|
||
"Impact": "Critical",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-42462",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||
"CWE": "CWE-434",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-42462",
|
||
"Impact": "Critical",
|
||
"Public": "20230927"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-42802",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-434",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-42802",
|
||
"Impact": "Critical",
|
||
"Public": "20231102"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-43813",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-43813",
|
||
"Impact": "High",
|
||
"Public": "20231213"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-46726",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46726",
|
||
"Impact": "Critical",
|
||
"Public": "20231213"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-46727",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46727",
|
||
"Impact": "Critical",
|
||
"Public": "20231213"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-51446",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-51446",
|
||
"Impact": "High",
|
||
"Public": "20240201"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-23645",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-23645",
|
||
"Impact": "Low",
|
||
"Public": "20240201"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-27096",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-27096",
|
||
"Impact": "None",
|
||
"Public": "20240318"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-27098",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-27098",
|
||
"Impact": "None",
|
||
"Public": "20240318"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-27104",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-27104",
|
||
"Impact": "None",
|
||
"Public": "20240318"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-27914",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-27914",
|
||
"Impact": "None",
|
||
"Public": "20240318"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-27930",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-27930",
|
||
"Impact": "None",
|
||
"Public": "20240318"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-27937",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-27937",
|
||
"Impact": "None",
|
||
"Public": "20240318"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-29889",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-29889",
|
||
"Impact": "None",
|
||
"Public": "20240507"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-31456",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-31456",
|
||
"Impact": "None",
|
||
"Public": "20240507"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "48856",
|
||
"Href": "https://bugzilla.altlinux.org/48856",
|
||
"Data": "Ошибка \"a2enmode: команда не найдена\" при установке"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20248030001",
|
||
"Comment": "glpi is earlier than 0:10.0.15-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20248030002",
|
||
"Comment": "glpi-apache2 is earlier than 0:10.0.15-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20248030003",
|
||
"Comment": "glpi-php8.1 is earlier than 0:10.0.15-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20248030004",
|
||
"Comment": "glpi-php8.2 is earlier than 0:10.0.15-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |