{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-41888","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-09-04T16:31:48.224Z","datePublished":"2023-09-26T22:44:02.121Z","dateUpdated":"2024-09-23T19:32:50.812Z"},"containers":{"cna":{"title":"Phishing through a login page malicious URL in GLPI","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp","tags":["x_refsource_CONFIRM"],"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp"}],"affected":[{"vendor":"glpi-project","product":"glpi","versions":[{"version":">= 10.0.8, < 10.0.10","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-09-26T22:44:02.121Z"},"descriptions":[{"lang":"en","value":"GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The lack of path filtering on the GLPI URL may allow an attacker to transmit a malicious URL of login page that can be used to attempt a phishing attack on user credentials. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability."}],"source":{"advisory":"GHSA-2hcg-75jj-hghp","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:09:49.298Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-23T18:54:27.599424Z","id":"CVE-2023-41888","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-23T19:32:50.812Z"}}]}}