{"id":"CVE-2024-47760","summary":"GLPI vulnerable to account takeover via API","details":"GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.17, a technician with an access to the API can take control of an account with higher privileges. Version 10.0.17 contains a patch for this issue.","aliases":["GHSA-r3mx-fr5f-gwgp"],"modified":"2026-04-10T05:17:30.256034Z","published":"2024-12-11T16:56:57.600Z","database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-284"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47760.json"},"references":[{"type":"WEB","url":"https://github.com/glpi-project/glpi/releases/tag/10.0.17"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47760.json"},{"type":"ADVISORY","url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-r3mx-fr5f-gwgp"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47760"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/glpi-project/glpi","events":[{"introduced":"0"},{"fixed":"08ee4d266768dc1f76cb6c716d7fd118d39676d9"}]}],"versions":["0.90","0.90-RC1","0.90-RC2","0.90-beta1","0.90-beta2","10.0.0","10.0.0-beta","10.0.0-rc1","10.0.0-rc2","10.0.0-rc3","10.0.1","10.0.10","10.0.11","10.0.12","10.0.13","10.0.14","10.0.15","10.0.16","10.0.2","10.0.3","10.0.4","10.0.5","10.0.6","10.0.7","10.0.8","10.0.9","9.1","9.1-RC1","9.1-RC2","9.3-beta","9.4.0","9.4.0-beta","9.4.0-rc1","9.4.0-rc2","9.4.1","9.4.1.1","9.5.0-rc1","9.5.0-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47760.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}]}