Security for everyone

CVE-2020-11034 Scanner

Detects 'Open Redirect' vulnerability in GLPI affects v. before 9.4.6.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

7 sec

Scan only one


Parent Category

CVE-2020-11034 Scanner Detail

GLPI, or the GNU Lesser General Public License Information, is an open-source, web-based IT infrastructure management software. It’s designed to help IT departments manage and maintain hardware and software inventories, track IT resources, and manage trouble tickets. With GLPI, businesses can gain greater control over their IT functions, streamline workflows, and automate repetitive tasks, giving IT departments more time to focus on business-critical activities.

CVE-2020-11034 is a vulnerability that was detected in GLPI prior to version 9.4.6. Specifically, the vulnerability allows attackers to bypass the open redirect protection mechanism, which is based on a regular expression, put in place to deter cybercriminals from exploiting URL redirects. By exploiting this vulnerability, attackers can redirect users to malicious content or phishing sites, tricking them into revealing sensitive information.

When exploited, this vulnerability can lead to significant consequences for businesses. Attackers can redirect users to malicious sites, which can result in serious data breaches and financial losses. Malicious actors can also exploit the vulnerability to gain unauthorized access to a network, leading to further cyber-attacks and disruption of services. With so many potential knock-on effects, it’s crucial for businesses to take steps to protect themselves against this vulnerability.

Finally, businesses can leverage the advanced pro features of the platform to safeguard their digital assets against emerging threats and potential vulnerabilities. With this platform, businesses can get quick and easy access to the latest intelligence on potential vulnerabilities and safeguard their IT infrastructure with minimal effort. By combining GLPI with, businesses can enjoy greater visibility and control over their IT infrastructure, freeing up IT departments to focus on core business activities.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture