{"id":"UBUNTU-CVE-2018-7563","details":"An issue was discovered in GLPI through 9.2.1. The application is affected by XSS in the query string to front/preference.php. An attacker is able to create a malicious URL that, if opened by an authenticated user with debug privilege, will execute JavaScript code supplied by the attacker. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.","modified":"2025-10-24T04:46:56Z","published":"2018-03-12T21:29:00Z","upstream":["CVE-2018-7563"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-7563"},{"type":"REPORT","url":"https://github.com/glpi-project/glpi/pull/3647"},{"type":"REPORT","url":"https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-7563"}],"affected":[{"package":{"name":"glpi","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/glpi@0.84.8+dfsg.1-1ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.84.8+dfsg.1-1","0.84.8+dfsg.1-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"0.84.8+dfsg.1-1ubuntu1","binary_name":"glpi"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-7563.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}