Learn about CVE-2022-39371, a high-severity stored Cross-Site Scripting (XSS) vulnerability in GLPI versions >= 10.0.0, < 10.0.4. Upgrade to version 10.0.4 to prevent exploitation.
A stored Cross-Site Scripting (XSS) vulnerability was discovered in GLPI, a Free Asset and IT Management Software package. This vulnerability could allow attackers to inject malicious scripts into the asset inventory, impacting confidentiality.
Understanding CVE-2022-39371
GLPI, short for Gestionnaire Libre de Parc Informatique, is affected by a stored XSS vulnerability that arises from improper neutralization of script-related HTML tags in asset inventory information.
What is CVE-2022-39371?
The CVE-2022-39371 vulnerability allows attackers to inject and store malicious scripts within the asset inventory of GLPI. By exploiting this vulnerability, threat actors could potentially execute arbitrary code when a victim accesses the affected asset information.
The Impact of CVE-2022-39371
The impact of this vulnerability is rated as HIGH, with a CVSS base score of 7.5. Attackers could compromise the confidentiality of the asset inventory by injecting malicious scripts, posing a significant risk to organizations using GLPI.
Technical Details of CVE-2022-39371
The following technical details outline the vulnerability, affected systems and versions, as well as the exploitation mechanism.
Vulnerability Description
The vulnerability stems from the lack of proper neutralization of script-related HTML tags in the asset inventory information of GLPI.
Affected Systems and Versions
GLPI versions greater than or equal to 10.0.0 and less than 10.0.4 are affected by this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability by injecting malicious scripts into the asset inventory information of GLPI, potentially leading to the execution of arbitrary code.
Mitigation and Prevention
To mitigate the risks associated with CVE-2022-39371, it is crucial to take immediate steps and implement long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates