Vulnerability Details CVE-2023-28633
GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 43.0%
CVSS Severity
CVSS v3 Score 3.5
Products affected by CVE-2023-28633
-
cpe:2.3:a:glpi-project:glpi:0.84
-
cpe:2.3:a:glpi-project:glpi:0.84.1
-
cpe:2.3:a:glpi-project:glpi:0.84.2
-
cpe:2.3:a:glpi-project:glpi:0.84.3
-
cpe:2.3:a:glpi-project:glpi:0.84.4
-
cpe:2.3:a:glpi-project:glpi:0.84.5
-
cpe:2.3:a:glpi-project:glpi:0.84.6
-
cpe:2.3:a:glpi-project:glpi:0.84.7
-
cpe:2.3:a:glpi-project:glpi:0.84.8
-
cpe:2.3:a:glpi-project:glpi:0.85
-
cpe:2.3:a:glpi-project:glpi:0.85.1
-
cpe:2.3:a:glpi-project:glpi:0.85.2
-
cpe:2.3:a:glpi-project:glpi:0.85.3
-
cpe:2.3:a:glpi-project:glpi:0.85.4
-
cpe:2.3:a:glpi-project:glpi:0.85.5
-
cpe:2.3:a:glpi-project:glpi:0.90
-
cpe:2.3:a:glpi-project:glpi:0.90.1
-
cpe:2.3:a:glpi-project:glpi:0.90.2
-
cpe:2.3:a:glpi-project:glpi:0.90.3
-
cpe:2.3:a:glpi-project:glpi:0.90.4
-
cpe:2.3:a:glpi-project:glpi:0.90.5
-
cpe:2.3:a:glpi-project:glpi:10.0.0
-
cpe:2.3:a:glpi-project:glpi:10.0.1
-
cpe:2.3:a:glpi-project:glpi:10.0.2
-
cpe:2.3:a:glpi-project:glpi:10.0.3
-
cpe:2.3:a:glpi-project:glpi:10.0.4
-
cpe:2.3:a:glpi-project:glpi:10.0.5
-
cpe:2.3:a:glpi-project:glpi:10.0.6
-
cpe:2.3:a:glpi-project:glpi:9.1
-
cpe:2.3:a:glpi-project:glpi:9.1.0
-
cpe:2.3:a:glpi-project:glpi:9.1.1
-
cpe:2.3:a:glpi-project:glpi:9.1.2
-
cpe:2.3:a:glpi-project:glpi:9.1.3
-
cpe:2.3:a:glpi-project:glpi:9.1.4
-
cpe:2.3:a:glpi-project:glpi:9.1.5
-
cpe:2.3:a:glpi-project:glpi:9.1.6
-
cpe:2.3:a:glpi-project:glpi:9.1.7
-
cpe:2.3:a:glpi-project:glpi:9.1.7.1
-
cpe:2.3:a:glpi-project:glpi:9.2
-
cpe:2.3:a:glpi-project:glpi:9.2.0
-
cpe:2.3:a:glpi-project:glpi:9.2.1
-
cpe:2.3:a:glpi-project:glpi:9.2.2
-
cpe:2.3:a:glpi-project:glpi:9.2.3
-
cpe:2.3:a:glpi-project:glpi:9.2.4
-
cpe:2.3:a:glpi-project:glpi:9.3.0
-
cpe:2.3:a:glpi-project:glpi:9.3.1
-
cpe:2.3:a:glpi-project:glpi:9.3.2
-
cpe:2.3:a:glpi-project:glpi:9.3.3
-
cpe:2.3:a:glpi-project:glpi:9.3.4
-
cpe:2.3:a:glpi-project:glpi:9.4.0
-
cpe:2.3:a:glpi-project:glpi:9.4.1
-
cpe:2.3:a:glpi-project:glpi:9.4.1.1
-
cpe:2.3:a:glpi-project:glpi:9.4.2
-
cpe:2.3:a:glpi-project:glpi:9.4.3
-
cpe:2.3:a:glpi-project:glpi:9.4.5
-
cpe:2.3:a:glpi-project:glpi:9.4.6
-
cpe:2.3:a:glpi-project:glpi:9.5.0
-
cpe:2.3:a:glpi-project:glpi:9.5.1
-
cpe:2.3:a:glpi-project:glpi:9.5.10
-
cpe:2.3:a:glpi-project:glpi:9.5.11
-
cpe:2.3:a:glpi-project:glpi:9.5.12
-
cpe:2.3:a:glpi-project:glpi:9.5.2
-
cpe:2.3:a:glpi-project:glpi:9.5.3
-
cpe:2.3:a:glpi-project:glpi:9.5.4
-
cpe:2.3:a:glpi-project:glpi:9.5.5
-
cpe:2.3:a:glpi-project:glpi:9.5.6
-
cpe:2.3:a:glpi-project:glpi:9.5.7
-
cpe:2.3:a:glpi-project:glpi:9.5.8
-
cpe:2.3:a:glpi-project:glpi:9.5.9