{"id":"CVE-2020-11034","details":"In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6.","modified":"2026-04-16T04:33:32.418915824Z","published":"2020-05-05T22:15:12.760Z","related":["GHSA-gxv6-xq9q-37hg"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/"},{"type":"FIX","url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/glpi-project/glpi","events":[{"introduced":"0"},{"fixed":"7fbee4f15b37c98f6f2078bd10634ef02b5edc25"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"9.4.6"}]}}],"versions":["0.90","0.90-RC1","0.90-RC2","0.90-beta1","0.90-beta2","9.1","9.1-RC1","9.1-RC2","9.3-beta","9.4.0","9.4.0-beta","9.4.0-rc1","9.4.0-rc2","9.4.1","9.4.1.1","9.4.2","9.4.3","9.4.4","9.4.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11034.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}