ALT-BU-2024-4925-1
Branch c10f2 update bulletin.
Package epson-inkjet-printer-escpr updated to version 1.8.5-alt1 for branch c10f2 in task 343514.
Closed bugs
Просьба обновить пакет до версии 1.8.5
Closed vulnerabilities
BDU:2022-03877
Уязвимость веб-инструмента управления ИТ-услугами iTop, связанная с повторным использованием CSRF-токенов, позволяющая нарушителю осуществить CSRF-атаку
BDU:2022-05425
Уязвимость веб-инструмента управления ИТ-услугами iTop, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
BDU:2023-01072
Уязвимость компонента AbstractSessionListener программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к сеансу пользователя
BDU:2023-08237
Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю раскрыть защищаемую информацию, выполнить фишинговые атаки и атаки с диск-загрузкой
Modified: 2024-11-21
CVE-2019-19821
A post-authentication privilege escalation in the web application of Combodo iTop allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses. This is fixed in all iTop packages (community, essential, professional) in versions : 2.5.4, 2.6.3, 2.7.0
- https://github.com/Combodo/iTop/security/advisories/GHSA-2gfp-2qvh-9796
- https://github.com/Combodo/iTop/security/advisories/GHSA-2gfp-2qvh-9796
- https://www.combodo.com/itop-193
- https://www.combodo.com/itop-193
- https://www.pentagrid.ch/de/blog/security_issues_in_teampasswordmanager_and_combodo_itop/
- https://www.pentagrid.ch/de/blog/security_issues_in_teampasswordmanager_and_combodo_itop/
Modified: 2024-11-21
CVE-2020-11696
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
Modified: 2024-11-21
CVE-2020-11697
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
Modified: 2024-11-21
CVE-2020-12777
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
Modified: 2024-11-21
CVE-2020-12778
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
Modified: 2024-11-21
CVE-2020-12779
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
Modified: 2024-11-21
CVE-2020-12780
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
Modified: 2024-11-21
CVE-2020-12781
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.
Modified: 2024-11-21
CVE-2020-15218
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, admin pages are cached, so that their content is visible after deconnection by using the browser back button. This is fixed in versions 2.7.2 and 3.0.0.
Modified: 2024-11-21
CVE-2020-15219
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, when a download error is triggered in the user portal, an SQL query is displayed to the user. This is fixed in versions 2.7.2 and 3.0.0.
Modified: 2024-11-21
CVE-2020-15220
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, two cookies are created for the same session, which leads to a possibility to steal user session. This is fixed in versions 2.7.2 and 3.0.0.
Modified: 2024-11-21
CVE-2020-15221
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, by modifying target browser local storage, an XSS can be generated in the iTop console breadcrumb. This is fixed in versions 2.7.2 and 3.0.0.
No data currently available.
Modified: 2024-11-21
CVE-2020-4079
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 2.8.0, when the ajax endpoint for the "excel export" portal functionality is called directly it allows getting data without scope filtering. This allows a user to access data they which they should not have access to. This is fixed in versions 2.7.2 and 3.0.0.
Modified: 2024-11-21
CVE-2021-21406
Combodo iTop is an open source, web based IT Service Management tool. In versions prior to 2.7.4, there is a command injection vulnerability in the Setup Wizard when providing Graphviz executable path. The vulnerability is patched in version 2.7.4 and 3.0.0.
Modified: 2024-11-21
CVE-2021-21407
Combodo iTop is an open source, web based IT Service Management tool. Prior to version 2.7.4, the CSRF token validation can be bypassed through iTop portal via a tricky browser procedure. The vulnerability is patched in version 2.7.4 and 3.0.0.
Modified: 2024-11-21
CVE-2021-32663
iTop is an open source web based IT Service Management tool. In affected versions an attacker can call the system setup without authentication. Given specific parameters this can lead to SSRF. This issue has been resolved in versions 2.6.5 and 2.7.5 and later
- https://github.com/Combodo/iTop/commit/43daa2ef088bf928a2386fa19324628c3f19b807
- https://github.com/Combodo/iTop/commit/43daa2ef088bf928a2386fa19324628c3f19b807
- https://github.com/Combodo/iTop/commit/6be9a87c150978752bc68baae1a5c4833ddadfec
- https://github.com/Combodo/iTop/commit/6be9a87c150978752bc68baae1a5c4833ddadfec
- https://github.com/Combodo/iTop/security/advisories/GHSA-ghqc-r8f6-q9m9
- https://github.com/Combodo/iTop/security/advisories/GHSA-ghqc-r8f6-q9m9
Modified: 2024-11-21
CVE-2021-32664
Combodo iTop is an open source web based IT Service Management tool. In affected versions there is a XSS vulnerability on "run query" page when logged as administrator. This has been resolved in versions 2.6.5 and 2.7.5.
- https://github.com/Combodo/iTop/commit/4f5c987d8b1bd12814dc606ea69b6cfb88490704
- https://github.com/Combodo/iTop/commit/4f5c987d8b1bd12814dc606ea69b6cfb88490704
- https://github.com/Combodo/iTop/commit/84741c19f0af6fa8e7082a8807eb089182e7b88a
- https://github.com/Combodo/iTop/commit/84741c19f0af6fa8e7082a8807eb089182e7b88a
- https://github.com/Combodo/iTop/commit/86f649affc12b5078efc86d9439d67d98f4cb2f6
- https://github.com/Combodo/iTop/commit/86f649affc12b5078efc86d9439d67d98f4cb2f6
- https://github.com/Combodo/iTop/security/advisories/GHSA-j758-ggwg-9mpj
- https://github.com/Combodo/iTop/security/advisories/GHSA-j758-ggwg-9mpj
Modified: 2024-11-21
CVE-2021-32775
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, a non admin user can get access to many class/field values through GroupBy Dashlet error message. This issue is fixed in versions 2.7.4 and 3.0.0.
Modified: 2024-11-21
CVE-2021-32776
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, CSRF tokens can be reused by a malicious user, as on Windows servers no cleanup is done on CSRF tokens. This issue is fixed in versions 2.7.4 and 3.0.0.
Modified: 2024-11-21
CVE-2021-41161
Combodo iTop is a web based IT Service Management tool. In versions prior to 3.0.0-beta6 the export CSV page don't properly escape the user supplied parameters, allowing for javascript injection into rendered csv files. Users are advised to upgrade. There are no known workarounds for this issue.
- https://github.com/Combodo/iTop/commit/c8f3d23d30c018bc44189b38fa34a5fffb4edb22
- https://github.com/Combodo/iTop/commit/c8f3d23d30c018bc44189b38fa34a5fffb4edb22
- https://github.com/Combodo/iTop/security/advisories/GHSA-788f-g6g9-f8fc
- https://github.com/Combodo/iTop/security/advisories/GHSA-788f-g6g9-f8fc
Modified: 2024-11-21
CVE-2021-41162
Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to beta6 the `ajax.render.php?operation=wizard_helper` page did not properly escape the user supplied parameters, allowing for a cross site scripting attack vector. Users are advised to upgrade. There are no known workarounds for this issue.
- https://github.com/Combodo/iTop/commit/83125d9ae16cfb2527b9d0ab0805a68b863244a0
- https://github.com/Combodo/iTop/commit/83125d9ae16cfb2527b9d0ab0805a68b863244a0
- https://github.com/Combodo/iTop/security/advisories/GHSA-w5jw-hfvp-gx95
- https://github.com/Combodo/iTop/security/advisories/GHSA-w5jw-hfvp-gx95
Modified: 2024-11-21
CVE-2021-41245
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, CSRF tokens generated by `privUITransactionFile` aren't properly checked. Versions 2.7.6 and 3.0.0 contain a patch for this issue. As a workaround, use the session implementation by adding in the iTop config file.
- https://github.com/Combodo/iTop/commit/7757f1f2d2330d49a3ebb40194f5ec4c8eaf8186
- https://github.com/Combodo/iTop/commit/7757f1f2d2330d49a3ebb40194f5ec4c8eaf8186
- https://github.com/Combodo/iTop/security/advisories/GHSA-33pr-5776-9jqf
- https://github.com/Combodo/iTop/security/advisories/GHSA-33pr-5776-9jqf
- https://huntr.dev/bounties/0a39630d-f4b9-4468-86d8-aea3b02f91ae
- https://huntr.dev/bounties/0a39630d-f4b9-4468-86d8-aea3b02f91ae
Modified: 2024-11-21
CVE-2021-46743
In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.
Modified: 2024-11-21
CVE-2022-24780
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.
- http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html
- https://github.com/Combodo/iTop/commit/93f273a28778e5da8e51096f021d2dc1adbf4ef3
- https://github.com/Combodo/iTop/commit/93f273a28778e5da8e51096f021d2dc1adbf4ef3
- https://github.com/Combodo/iTop/commit/b6fac4b411b8d145fc30fa35c66b51243eafd06b
- https://github.com/Combodo/iTop/commit/b6fac4b411b8d145fc30fa35c66b51243eafd06b
- https://github.com/Combodo/iTop/commit/eb2a615bd28100442c7f6171707bb40884af2305
- https://github.com/Combodo/iTop/commit/eb2a615bd28100442c7f6171707bb40884af2305
- https://github.com/Combodo/iTop/security/advisories/GHSA-v97m-wgxq-rh54
- https://github.com/Combodo/iTop/security/advisories/GHSA-v97m-wgxq-rh54
- https://markus-krell.de/itop-template-injection-inside-customer-portal/
- https://markus-krell.de/itop-template-injection-inside-customer-portal/
Modified: 2024-11-21
CVE-2022-24811
Combodi iTop is a web based IT Service Management tool. Prior to versions 2.7.6 and 3.0.0, cross-site scripting is possible for scripts outside of script tags when displaying HTML attachments. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.
- https://github.com/Combodo/iTop/commit/92a9a8c65f3cbb2cd4414ca3a3b45a5754ba57b4
- https://github.com/Combodo/iTop/commit/92a9a8c65f3cbb2cd4414ca3a3b45a5754ba57b4
- https://github.com/Combodo/iTop/security/advisories/GHSA-67x5-mqg4-rvgc
- https://github.com/Combodo/iTop/security/advisories/GHSA-67x5-mqg4-rvgc
- https://huntr.dev/bounties/1625056478879-Combodo/iTop/
- https://huntr.dev/bounties/1625056478879-Combodo/iTop/
Modified: 2025-02-13
CVE-2022-24894
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony HTTP cache system, acts as a reverse proxy: It caches entire responses (including headers) and returns them to the clients. In a recent change in the `AbstractSessionListener`, the response might contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this response might bill stored and return to the next clients. An attacker can use this vulnerability to retrieve the victim's session. This issue has been patched and is available for branch 4.4.
- https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb
- https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb
- https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv
- https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv
- https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html
Modified: 2024-11-21
CVE-2022-31402
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/webservices/export-v2.php.
- https://github.com/YavuzSahbaz/CVE-2022-31402/blob/main/iTop%203.0.1%20XSS%20Vulnerability
- https://github.com/YavuzSahbaz/CVE-2022-31402/blob/main/iTop%203.0.1%20XSS%20Vulnerability
- https://sourceforge.net/projects/itop/
- https://sourceforge.net/projects/itop/
- https://www.itophub.io/
- https://www.itophub.io/
Modified: 2024-11-21
CVE-2022-31403
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.
Modified: 2024-11-21
CVE-2022-39214
Combodo iTop is an open source, web-based IT service management platform. Prior to versions 2.7.8 and 3.0.2-1, a user who can log in on iTop is able to take over any account just by knowing the account's username. This issue is fixed in versions 2.7.8 and 3.0.2-1.
- https://github.com/Combodo/iTop/commit/4c1df9927d1dc6b0181ee20721f93346def026fd
- https://github.com/Combodo/iTop/commit/4c1df9927d1dc6b0181ee20721f93346def026fd
- https://github.com/Combodo/iTop/commit/bdebea62b642622ed71410b26c81e8537e6e58fa
- https://github.com/Combodo/iTop/commit/bdebea62b642622ed71410b26c81e8537e6e58fa
- https://github.com/Combodo/iTop/security/advisories/GHSA-vj96-j84g-jhx4
- https://github.com/Combodo/iTop/security/advisories/GHSA-vj96-j84g-jhx4
Modified: 2024-11-21
CVE-2022-39216
Combodo iTop is an open source, web-based IT service management platform. Prior to versions 2.7.8 and 3.0.2-1, the reset password token is generated without any randomness parameter. This may lead to account takeover. The issue is fixed in versions 2.7.8 and 3.0.2-1.
- https://github.com/Combodo/iTop/commit/35a8b501c9e4e767ec4b36c2586f34d4ab66d229
- https://github.com/Combodo/iTop/commit/35a8b501c9e4e767ec4b36c2586f34d4ab66d229
- https://github.com/Combodo/iTop/commit/f10e9c2d64d0304777660a4f70f1e80850ea864b
- https://github.com/Combodo/iTop/commit/f10e9c2d64d0304777660a4f70f1e80850ea864b
- https://github.com/Combodo/iTop/security/advisories/GHSA-hggq-48p2-cmhm
- https://github.com/Combodo/iTop/security/advisories/GHSA-hggq-48p2-cmhm
Modified: 2024-11-21
CVE-2022-39261
Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.
- https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b
- https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b
- https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33
- https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33
- [debian-lts-announce] 20221011 [SECURITY] [DLA 3147-1] twig security update
- [debian-lts-announce] 20221011 [SECURITY] [DLA 3147-1] twig security update
- FEDORA-2022-d39b2a755b
- FEDORA-2022-d39b2a755b
- FEDORA-2022-4490a4772d
- FEDORA-2022-4490a4772d
- FEDORA-2022-9d8ee4a6de
- FEDORA-2022-9d8ee4a6de
- FEDORA-2022-c6fe3ebd94
- FEDORA-2022-c6fe3ebd94
- FEDORA-2022-73b9fb7a77
- FEDORA-2022-73b9fb7a77
- FEDORA-2022-1695454935
- FEDORA-2022-1695454935
- DSA-5248
- DSA-5248
- https://www.drupal.org/sa-core-2022-016
- https://www.drupal.org/sa-core-2022-016
Modified: 2024-11-21
CVE-2023-34447
iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, on `pages/UI.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.
- https://github.com/Combodo/iTop/commit/519751faa10b2fc5b75ea4516a1b8ef13ca35b33
- https://github.com/Combodo/iTop/commit/b8f61362f570e1ef8127175331012b7fc8aba802
- https://github.com/Combodo/iTop/security/advisories/GHSA-6rfm-2rwg-mj7p
- https://github.com/Combodo/iTop/commit/519751faa10b2fc5b75ea4516a1b8ef13ca35b33
- https://github.com/Combodo/iTop/security/advisories/GHSA-6rfm-2rwg-mj7p
- https://github.com/Combodo/iTop/commit/b8f61362f570e1ef8127175331012b7fc8aba802
Modified: 2025-02-06
CVE-2023-38511
iTop is an IT service management platform. Dashboard editor : can load multiple files and URL, and full path disclosure on dashboard config file. This vulnerability is fixed in 3.0.4 and 3.1.1.
- https://github.com/Combodo/iTop/commit/343e87a8d4fc8253fd81aeaf0dcc424b9dc4eda7
- https://github.com/Combodo/iTop/commit/343e87a8d4fc8253fd81aeaf0dcc424b9dc4eda7
- https://github.com/Combodo/iTop/commit/89145593ef2e077529a6f7ee7cde712db637e1ab
- https://github.com/Combodo/iTop/commit/89145593ef2e077529a6f7ee7cde712db637e1ab
- https://github.com/Combodo/iTop/security/advisories/GHSA-323r-chx5-m9gm
- https://github.com/Combodo/iTop/security/advisories/GHSA-323r-chx5-m9gm
- https://www.synacktiv.com/advisories/file-read-in-itop
- https://www.synacktiv.com/advisories/file-read-in-itop
Modified: 2025-02-06
CVE-2023-43790
iTop is an IT service management platform. By manipulating HTTP queries, a user can inject malicious content in the fields used for the object friendlyname value. This vulnerability is fixed in 3.1.1 and 3.2.0.
- https://github.com/Combodo/iTop/commit/03c9ffc0334fd44f3f0e82477264087064e1c732
- https://github.com/Combodo/iTop/commit/03c9ffc0334fd44f3f0e82477264087064e1c732
- https://github.com/Combodo/iTop/security/advisories/GHSA-96xm-p83r-hm97
- https://github.com/Combodo/iTop/security/advisories/GHSA-96xm-p83r-hm97
Modified: 2025-02-06
CVE-2023-44396
iTop is an IT service management platform. Dashlet edits ajax endpoints can be used to produce XSS. Fixed in iTop 2.7.10, 3.0.4, and 3.1.1.
- https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273
- https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273
- https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f
- https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f
- https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35
- https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35
Modified: 2025-02-06
CVE-2023-45808
iTop is an IT service management platform. When creating or updating an object, extkey values aren't checked to be in the current user silo. In other words, by forging an http request, the user can create objects pointing to out of silo objects (for example a UserRequest in an out of scope Organization). Fixed in iTop 2.7.10, 3.0.4, 3.1.1, and 3.2.0.
- https://github.com/Combodo/iTop/commit/5a434486443a2cf8b8a288475aada54d0a068ca7
- https://github.com/Combodo/iTop/commit/5a434486443a2cf8b8a288475aada54d0a068ca7
- https://github.com/Combodo/iTop/commit/8f61c02cbe17badff87bff9b8ada85e783c47385
- https://github.com/Combodo/iTop/commit/8f61c02cbe17badff87bff9b8ada85e783c47385
- https://github.com/Combodo/iTop/security/advisories/GHSA-245j-66p9-pwmh
- https://github.com/Combodo/iTop/security/advisories/GHSA-245j-66p9-pwmh
Modified: 2024-11-21
CVE-2023-46734
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use `is_safe=html` but don't actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters.
- https://github.com/symfony/symfony/commit/5d095d5feb1322b16450284a04d6bb48d1198f54
- https://github.com/symfony/symfony/commit/5d095d5feb1322b16450284a04d6bb48d1198f54
- https://github.com/symfony/symfony/commit/9da9a145ce57e4585031ad4bee37c497353eec7c
- https://github.com/symfony/symfony/commit/9da9a145ce57e4585031ad4bee37c497353eec7c
- https://github.com/symfony/symfony/security/advisories/GHSA-q847-2q57-wmr3
- https://github.com/symfony/symfony/security/advisories/GHSA-q847-2q57-wmr3
- https://lists.debian.org/debian-lts-announce/2023/11/msg00019.html
- https://lists.debian.org/debian-lts-announce/2023/11/msg00019.html
Modified: 2025-02-06
CVE-2023-47123
iTop is an IT service management platform. By filling malicious code in an object friendlyname / complementary name, an XSS attack can be performed when this object will displayed as an n:n relation item in another object. This vulnerability is fixed in 3.1.1 and 3.2.0.
- https://github.com/Combodo/iTop/commit/34ba4fa0ce99534f751d9f170fe0eda103e20c72
- https://github.com/Combodo/iTop/commit/34ba4fa0ce99534f751d9f170fe0eda103e20c72
- https://github.com/Combodo/iTop/security/advisories/GHSA-mx8x-693w-9hjp
- https://github.com/Combodo/iTop/security/advisories/GHSA-mx8x-693w-9hjp
Modified: 2025-02-07
CVE-2023-47622
iTop is an IT service management platform. When dashlet are refreshed, XSS attacks are possible. This vulnerability is fixed in 3.0.4 and 3.1.1.
- https://github.com/Combodo/iTop/commit/09be84f69da0fe44221f63b8c2db041bdf7dd7f9
- https://github.com/Combodo/iTop/commit/09be84f69da0fe44221f63b8c2db041bdf7dd7f9
- https://github.com/Combodo/iTop/security/advisories/GHSA-q9cm-q7fc-frxh
- https://github.com/Combodo/iTop/security/advisories/GHSA-q9cm-q7fc-frxh
Modified: 2025-02-07
CVE-2023-47626
iTop is an IT service management platform. When displaying/editing the user's personal tokens, XSS attacks are possible. This vulnerability is fixed in 3.1.1.
Modified: 2025-02-07
CVE-2023-48709
iTop is an IT service management platform. When exporting data from backoffice or portal in CSV or Excel files, users' inputs may include malicious formulas that may be imported into Excel. As Excel 2016 does **not** prevent Remote Code Execution by default, uninformed users may become victims. This vulnerability is fixed in 2.7.9, 3.0.4, 3.1.1, and 3.2.0.
- https://github.com/Combodo/iTop/commit/083a0b79bfa2c106735b5c10eddb35a05ec7f04a
- https://github.com/Combodo/iTop/commit/083a0b79bfa2c106735b5c10eddb35a05ec7f04a
- https://github.com/Combodo/iTop/commit/b10bcb976dfe8e55aa0f659bfbcdd18334a1b17c
- https://github.com/Combodo/iTop/commit/b10bcb976dfe8e55aa0f659bfbcdd18334a1b17c
- https://github.com/Combodo/iTop/security/advisories/GHSA-9q3x-9987-53x9
- https://github.com/Combodo/iTop/security/advisories/GHSA-9q3x-9987-53x9
Modified: 2025-02-07
CVE-2023-48710
iTop is an IT service management platform. Files from the `env-production` folder can be retrieved even though they should have restricted access. Hopefully, there is no sensitive files stored in that folder natively, but there could be from a third-party module. The `pages/exec.php` script as been fixed to limit execution of PHP files only. Other file types won't be retrieved and exposed. The vulnerability is fixed in 2.7.10, 3.0.4, 3.1.1, and 3.2.0.
- https://github.com/Combodo/iTop/commit/3b2da39469f7a4636ed250ed0d33f4efff38be26
- https://github.com/Combodo/iTop/commit/3b2da39469f7a4636ed250ed0d33f4efff38be26
- https://github.com/Combodo/iTop/security/advisories/GHSA-g652-q7cc-7hfc
- https://github.com/Combodo/iTop/security/advisories/GHSA-g652-q7cc-7hfc
Closed vulnerabilities
BDU:2024-02163
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-26
CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
- RHSA-2024:2049
- RHSA-2024:2055
- RHSA-2024:2064
- RHSA-2024:2066
- RHSA-2024:2077
- RHSA-2024:2084
- RHSA-2024:2089
- RHSA-2024:2090
- RHSA-2024:2097
- RHSA-2024:2098
- RHSA-2024:2548
- RHSA-2024:2645
- RHSA-2024:2669
- RHSA-2024:2672
- RHSA-2024:2784
- RHSA-2024:2877
- RHSA-2024:3254
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHBZ#2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://pkg.go.dev/vuln/GO-2024-2658
- RHSA-2024:2049
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- RHBZ#2265513
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHSA-2024:3254
- RHSA-2024:2877
- RHSA-2024:2784
- RHSA-2024:2672
- RHSA-2024:2669
- RHSA-2024:2645
- RHSA-2024:2548
- RHSA-2024:2098
- RHSA-2024:2097
- RHSA-2024:2090
- RHSA-2024:2089
- RHSA-2024:2084
- RHSA-2024:2077
- RHSA-2024:2066
- RHSA-2024:2064
- RHSA-2024:2055
Closed bugs
/usr/libexec/podman/catatonit: no such file or directory
Closed vulnerabilities
BDU:2024-02163
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2022-27651
A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity.
- https://bugzilla.redhat.com/show_bug.cgi?id=2066840
- https://bugzilla.redhat.com/show_bug.cgi?id=2066840
- https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
- https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
- https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h
- https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h
- FEDORA-2022-1a15fe81f0
- FEDORA-2022-1a15fe81f0
- FEDORA-2022-224a93852c
- FEDORA-2022-224a93852c
- FEDORA-2022-e6388650ea
- FEDORA-2022-e6388650ea
Modified: 2024-11-21
CVE-2022-2990
An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
- https://bugzilla.redhat.com/show_bug.cgi?id=2121453
- https://bugzilla.redhat.com/show_bug.cgi?id=2121453
- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Modified: 2024-11-26
CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
- RHSA-2024:2049
- RHSA-2024:2055
- RHSA-2024:2064
- RHSA-2024:2066
- RHSA-2024:2077
- RHSA-2024:2084
- RHSA-2024:2089
- RHSA-2024:2090
- RHSA-2024:2097
- RHSA-2024:2098
- RHSA-2024:2548
- RHSA-2024:2645
- RHSA-2024:2669
- RHSA-2024:2672
- RHSA-2024:2784
- RHSA-2024:2877
- RHSA-2024:3254
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHBZ#2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://pkg.go.dev/vuln/GO-2024-2658
- RHSA-2024:2049
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- RHBZ#2265513
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHSA-2024:3254
- RHSA-2024:2877
- RHSA-2024:2784
- RHSA-2024:2672
- RHSA-2024:2669
- RHSA-2024:2645
- RHSA-2024:2548
- RHSA-2024:2098
- RHSA-2024:2097
- RHSA-2024:2090
- RHSA-2024:2089
- RHSA-2024:2084
- RHSA-2024:2077
- RHSA-2024:2066
- RHSA-2024:2064
- RHSA-2024:2055
Modified: 2024-11-21
CVE-2024-24786
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
- http://www.openwall.com/lists/oss-security/2024/03/08/4
- http://www.openwall.com/lists/oss-security/2024/03/08/4
- https://go.dev/cl/569356
- https://go.dev/cl/569356
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDMBHAVSDU2FBDZ45U3A2VLSM35OJ2HU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDMBHAVSDU2FBDZ45U3A2VLSM35OJ2HU/
- https://pkg.go.dev/vuln/GO-2024-2611
- https://pkg.go.dev/vuln/GO-2024-2611
- https://security.netapp.com/advisory/ntap-20240517-0002/
- https://security.netapp.com/advisory/ntap-20240517-0002/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-14232
The read_chunk function in flif-dec.cpp in Free Lossless Image Format (FLIF) 0.3 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted flif file.
Modified: 2024-11-21
CVE-2018-10971
An issue was discovered in Free Lossless Image Format (FLIF) 0.3. The Plane function in image/image.hpp allows remote attackers to cause a denial of service (attempted excessive memory allocation) via a crafted file.
Modified: 2024-11-21
CVE-2018-10972
An issue was discovered in Free Lossless Image Format (FLIF) 0.3. The TransformPaletteC::process function in transform/palette_C.hpp allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted file.
Modified: 2024-11-21
CVE-2018-11507
An issue was discovered in Free Lossless Image Format (FLIF) 0.3. An attacker can trigger a long loop in image_load_pnm in image/image-pnm.cpp.
Modified: 2024-11-21
CVE-2018-12109
An issue was discovered in Free Lossless Image Format (FLIF) 0.3. The TransformPaletteC
Modified: 2024-11-21
CVE-2018-14876
An issue was discovered in image_save_png in image/image-png.cpp in Free Lossless Image Format (FLIF) 0.3. Attackers can trigger a longjmp that leads to an uninitialized stack frame after a libpng error concerning the IHDR image width.
Modified: 2024-11-21
CVE-2019-14373
An issue was discovered in image_save_png in image/image-png.cpp in Free Lossless Image Format (FLIF) 0.3. Attackers can trigger a heap-based buffer over-read in libpng via a crafted flif file.