A new version of GLPI is available!
This version fixes some security issues that were recently discovered. Updating is recommended!
The GLPI version 10.0.17 archive is available on GitHub.
Below is a list of security issues fixed in this version:
- Session hijacking by an unauthenticated user (CVE-2024-50339)
- Account takeover via SQL injection (CVE-2024-40638)
- Email address enumeration by an unauthenticated user (CVE-2024-43416)
- Account takeover without privilege escalation via API (CVE-2024-47758)
- Account takeover via password reset feature (CVE-2024-47761)
- Account takeover via API (CVE-2024-47760)
- Unauthorized account deletion by an authenticated user (CVE-2024-48912)
- SQL injection by an authenticated user (CVE-2024-45608)
- SQL injection in the ticket form (CVE-2024-41679)
- Stored XSS in RSS feeds (CVE-2024-45611)
- Stored XSS in uploaded documents (CVE-2024-47759)
- Multiple reflected XSS (CVE-2024-43417, CVE-2024-43418, CVE-2024-45609, CVE-2024-45610, CVE-2024-41678)
Many bug fixes have also been made, check the changelog for more details.
We thank everyone who contributed to this new version and more generally all those who regularly support the GLPI project.
Best regards.