A new GLPI version is available.
This release fixes a critical security issue that have been recently discovered. Update is strongly recommended!
You can download the GLPI 10.0.10 archive on GitHub.
You will find below the list of security issues fixed in this bugfixes version:
- Unallowed PHP script execution (CVE-2023-42802).
- Account takeover via SQL Injection in UI layout preferences (CVE-2023-41320).
- Account takeover via Kanban feature (CVE-2023-41326).
- Account takeover through API (CVE-2023-41324).
- File deletion through document upload process (CVE-2023-42462).
- Sensitive fields enumeration through API (CVE-2023-41321).
- Privilege Escalation from technician to super-admin (CVE-2023-41322).
- Users login enumeration by unauthenticated user (CVE-2023-41323).
- Phishing through a login page malicious URL (CVE-2023-41888).
- SQL injection in ITIL actors (CVE-2023-42461).
Also, here is a short list of main changes done in this version:
- PHP 8.3 and MySQL 8.1 support.
- Enable usage of images in rich text of followups/tasks/solution templates.
- Improve ticket timeline rendering performances.
- Fix issues with usage of LDAP bind options.
- Fix some issues on SLA/OLA escalation levels computation.
- Fix some issues on search on numeric and dates fields.
The full changelog is available for more details.
We would like to thank all people who contributed to this new version and all those who contributes regularly to the GLPI project!