Skip site navigation (1)Skip section navigation (2)


| raw e-mail | index | archive | help
The branch main has been updated by philip:

URL: https://cgit.FreeBSD.org/ports/commit/?id=df30adf7045ec3ad915757f91e8dda38db74f8ad

commit df30adf7045ec3ad915757f91e8dda38db74f8ad
Author:     Tomáš Čiernik <tomas@ciernik.sk>
AuthorDate: 2024-04-23 11:46:00 +0000
Commit:     Philip Paeps <philip@FreeBSD.org>
CommitDate: 2024-04-24 03:10:44 +0000

    security/vuxml: add CVEs related to www/glpi
    
    New CVEs for GLPI which were corrected in versions 10.0.11, 10.0.12 and
    10.0.13.
    
    PR:             278548
    PR:             278090
---
 security/vuxml/vuln/2024.xml | 103 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 103 insertions(+)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index da6a020483c3..9caa6384714f 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,106 @@
+  <vuln vid="bb49f1fa-00da-11ef-92b7-589cfc023192">
+    <topic>GLPI -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>glpi</name>
+	<range><lt>10.0.13,1</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>GLPI team reports:</p>
+	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.13">;
+	  <p>GLPI 10.0.13 Changelog</p>
+	  <ul>
+	    <li>[SECURITY - high] SQL Injection in through the search engine (CVE-2024-27096)</li>
+	    <li>[SECURITY - moderate] Blind SSRF using Arbitrary Object Instantiation (CVE-2024-27098)</li>
+	    <li>[SECURITY - moderate] Stored XSS in dashboards (CVE-2024-27104)</li>
+	    <li>[SECURITY - moderate] Reflected XSS in debug mode (CVE-2024-27914)</li>
+	    <li>[SECURITY - moderate] Sensitive fields access through dropdowns (CVE-2024-27930)</li>
+	    <li>[SECURITY - moderate] Users emails enumeration (CVE-2024-27937)</li>
+	  </ul>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-27096</cvename>
+      <cvename>CVE-2024-27098</cvename>
+      <cvename>CVE-2024-27104</cvename>
+      <cvename>CVE-2024-27914</cvename>
+      <cvename>CVE-2024-27930</cvename>
+      <cvename>CVE-2024-27937</cvename>
+      <url>https://github.com/glpi-project/glpi/releases/tag/10.0.13</url>;
+    </references>
+    <dates>
+      <discovery>2024-03-13</discovery>
+      <entry>2024-04-22</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="faccf131-00d9-11ef-92b7-589cfc023192">
+    <topic>GLPI -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>glpi</name>
+	<range><lt>10.0.12,1</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>GLPI team reports:</p>
+	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.12">;
+	  <p>GLPI 10.0.12 Changelog</p>
+	  <ul>
+	    <li>[SECURITY - moderate] Reflected XSS in reports pages (CVE-2024-23645)</li>
+	    <li>[SECURITY - moderate] LDAP Injection during authentication (CVE-2023-51446)</li>
+	  </ul>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-23645</cvename>
+      <cvename>CVE-2023-51446</cvename>
+      <url>https://github.com/glpi-project/glpi/releases/tag/10.0.12</url>;
+    </references>
+    <dates>
+      <discovery>2024-02-01</discovery>
+      <entry>2024-04-22</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="ed688880-00c4-11ef-92b7-589cfc023192">
+    <topic>GLPI -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>glpi</name>
+	<range><lt>10.0.11,1</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>GLPI team reports:</p>
+	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.11">;
+	  <p>GLPI 10.0.11 Changelog</p>
+	  <ul>
+	    <li>[SECURITY - moderate] Authenticated SQL Injection (CVE-2023-43813)</li>
+	    <li>[SECURITY - high] SQL injection through inventory agent request (CVE-2023-46727)</li>
+	    <li>[SECURITY - high] Remote code execution from LDAP server configuration form on PHP 7.4 (CVE-2023-46726)</li>
+	  </ul>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2023-43813</cvename>
+      <cvename>CVE-2023-46727</cvename>
+      <cvename>CVE-2023-46726</cvename>
+      <url>https://github.com/glpi-project/glpi/releases/tag/10.0.11</url>;
+    </references>
+    <dates>
+      <discovery>2023-12-13</discovery>
+      <entry>2024-04-22</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="2ce1a2f1-0177-11ef-a45e-08002784c58d">
     <topic>ruby -- Arbitrary memory address read vulnerability with Regex search</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?>