{"api_version":"1","generated_at":"2026-04-22T21:16:12+00:00","cve":"CVE-2023-41323","urls":{"html":"https://cve.report/CVE-2023-41323","api":"https://cve.report/api/cve/CVE-2023-41323.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-41323","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-41323"},"summary":{"title":"CVE-2023-41323","description":"GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-09-27 15:19:00","updated_at":"2023-09-29 18:12:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9","name":"https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9","refsource":"MISC","tags":[],"title":"Users login enumeration by unauthenticated user · Advisory · glpi-project/glpi · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-41323","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41323","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"41323","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"glpi-project","cpe5":"glpi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-41323","qid":"283757","title":"Fedora Security Update for python (FEDORA-2023-3d775d93be)"},{"cve":"CVE-2023-41323","qid":"283758","title":"Fedora Security Update for python (FEDORA-2023-bde7913e5a)"},{"cve":"CVE-2023-41323","qid":"284273","title":"Fedora Security Update for python (FEDORA-2023-a74513bda8)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-41323","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"glpi-project","product":{"product_data":[{"product_name":"glpi","version":{"version_data":[{"version_affected":"=","version_value":">= 0.68, < 10.0.10"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9","refsource":"MISC","name":"https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9"}]},"source":{"advisory":"GHSA-5cf4-6q6r-49x9","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-27 15:19:00","lastModifiedDate":"2023-09-29 18:12:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*","versionStartIncluding":"0.68","versionEndExcluding":"10.0.10","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}