ALT-PU-2024-4547-3
Closed vulnerabilities
BDU:2022-03877
Уязвимость веб-инструмента управления ИТ-услугами iTop, связанная с повторным использованием CSRF-токенов, позволяющая нарушителю осуществить CSRF-атаку
BDU:2022-05425
Уязвимость веб-инструмента управления ИТ-услугами iTop, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
BDU:2023-01072
Уязвимость компонента AbstractSessionListener программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к сеансу пользователя
BDU:2023-08237
Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю раскрыть защищаемую информацию, выполнить фишинговые атаки и атаки с диск-загрузкой
Modified: 2024-11-21
CVE-2019-19821
A post-authentication privilege escalation in the web application of Combodo iTop allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses. This is fixed in all iTop packages (community, essential, professional) in versions : 2.5.4, 2.6.3, 2.7.0
- https://github.com/Combodo/iTop/security/advisories/GHSA-2gfp-2qvh-9796
- https://github.com/Combodo/iTop/security/advisories/GHSA-2gfp-2qvh-9796
- https://www.combodo.com/itop-193
- https://www.combodo.com/itop-193
- https://www.pentagrid.ch/de/blog/security_issues_in_teampasswordmanager_and_combodo_itop/
- https://www.pentagrid.ch/de/blog/security_issues_in_teampasswordmanager_and_combodo_itop/
Modified: 2024-11-21
CVE-2020-11696
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
Modified: 2024-11-21
CVE-2020-11697
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
Modified: 2024-11-21
CVE-2020-12777
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
Modified: 2024-11-21
CVE-2020-12778
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
Modified: 2024-11-21
CVE-2020-12779
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
Modified: 2024-11-21
CVE-2020-12780
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
Modified: 2024-11-21
CVE-2020-12781
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.
Modified: 2024-11-21
CVE-2020-15218
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, admin pages are cached, so that their content is visible after deconnection by using the browser back button. This is fixed in versions 2.7.2 and 3.0.0.
Modified: 2024-11-21
CVE-2020-15219
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, when a download error is triggered in the user portal, an SQL query is displayed to the user. This is fixed in versions 2.7.2 and 3.0.0.
Modified: 2024-11-21
CVE-2020-15220
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, two cookies are created for the same session, which leads to a possibility to steal user session. This is fixed in versions 2.7.2 and 3.0.0.
Modified: 2024-11-21
CVE-2020-15221
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 3.0.0, by modifying target browser local storage, an XSS can be generated in the iTop console breadcrumb. This is fixed in versions 2.7.2 and 3.0.0.
No data currently available.
Modified: 2024-11-21
CVE-2020-4079
Combodo iTop is a web based IT Service Management tool. In iTop before versions 2.7.2 and 2.8.0, when the ajax endpoint for the "excel export" portal functionality is called directly it allows getting data without scope filtering. This allows a user to access data they which they should not have access to. This is fixed in versions 2.7.2 and 3.0.0.
Modified: 2024-11-21
CVE-2021-21406
Combodo iTop is an open source, web based IT Service Management tool. In versions prior to 2.7.4, there is a command injection vulnerability in the Setup Wizard when providing Graphviz executable path. The vulnerability is patched in version 2.7.4 and 3.0.0.
Modified: 2024-11-21
CVE-2021-21407
Combodo iTop is an open source, web based IT Service Management tool. Prior to version 2.7.4, the CSRF token validation can be bypassed through iTop portal via a tricky browser procedure. The vulnerability is patched in version 2.7.4 and 3.0.0.
Modified: 2024-11-21
CVE-2021-32663
iTop is an open source web based IT Service Management tool. In affected versions an attacker can call the system setup without authentication. Given specific parameters this can lead to SSRF. This issue has been resolved in versions 2.6.5 and 2.7.5 and later
- https://github.com/Combodo/iTop/commit/43daa2ef088bf928a2386fa19324628c3f19b807
- https://github.com/Combodo/iTop/commit/43daa2ef088bf928a2386fa19324628c3f19b807
- https://github.com/Combodo/iTop/commit/6be9a87c150978752bc68baae1a5c4833ddadfec
- https://github.com/Combodo/iTop/commit/6be9a87c150978752bc68baae1a5c4833ddadfec
- https://github.com/Combodo/iTop/security/advisories/GHSA-ghqc-r8f6-q9m9
- https://github.com/Combodo/iTop/security/advisories/GHSA-ghqc-r8f6-q9m9
Modified: 2024-11-21
CVE-2021-32664
Combodo iTop is an open source web based IT Service Management tool. In affected versions there is a XSS vulnerability on "run query" page when logged as administrator. This has been resolved in versions 2.6.5 and 2.7.5.
- https://github.com/Combodo/iTop/commit/4f5c987d8b1bd12814dc606ea69b6cfb88490704
- https://github.com/Combodo/iTop/commit/4f5c987d8b1bd12814dc606ea69b6cfb88490704
- https://github.com/Combodo/iTop/commit/84741c19f0af6fa8e7082a8807eb089182e7b88a
- https://github.com/Combodo/iTop/commit/84741c19f0af6fa8e7082a8807eb089182e7b88a
- https://github.com/Combodo/iTop/commit/86f649affc12b5078efc86d9439d67d98f4cb2f6
- https://github.com/Combodo/iTop/commit/86f649affc12b5078efc86d9439d67d98f4cb2f6
- https://github.com/Combodo/iTop/security/advisories/GHSA-j758-ggwg-9mpj
- https://github.com/Combodo/iTop/security/advisories/GHSA-j758-ggwg-9mpj
Modified: 2024-11-21
CVE-2021-32775
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, a non admin user can get access to many class/field values through GroupBy Dashlet error message. This issue is fixed in versions 2.7.4 and 3.0.0.
Modified: 2024-11-21
CVE-2021-32776
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, CSRF tokens can be reused by a malicious user, as on Windows servers no cleanup is done on CSRF tokens. This issue is fixed in versions 2.7.4 and 3.0.0.
Modified: 2024-11-21
CVE-2021-41161
Combodo iTop is a web based IT Service Management tool. In versions prior to 3.0.0-beta6 the export CSV page don't properly escape the user supplied parameters, allowing for javascript injection into rendered csv files. Users are advised to upgrade. There are no known workarounds for this issue.
- https://github.com/Combodo/iTop/commit/c8f3d23d30c018bc44189b38fa34a5fffb4edb22
- https://github.com/Combodo/iTop/commit/c8f3d23d30c018bc44189b38fa34a5fffb4edb22
- https://github.com/Combodo/iTop/security/advisories/GHSA-788f-g6g9-f8fc
- https://github.com/Combodo/iTop/security/advisories/GHSA-788f-g6g9-f8fc
Modified: 2024-11-21
CVE-2021-41162
Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to beta6 the `ajax.render.php?operation=wizard_helper` page did not properly escape the user supplied parameters, allowing for a cross site scripting attack vector. Users are advised to upgrade. There are no known workarounds for this issue.
- https://github.com/Combodo/iTop/commit/83125d9ae16cfb2527b9d0ab0805a68b863244a0
- https://github.com/Combodo/iTop/commit/83125d9ae16cfb2527b9d0ab0805a68b863244a0
- https://github.com/Combodo/iTop/security/advisories/GHSA-w5jw-hfvp-gx95
- https://github.com/Combodo/iTop/security/advisories/GHSA-w5jw-hfvp-gx95
Modified: 2024-11-21
CVE-2021-41245
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, CSRF tokens generated by `privUITransactionFile` aren't properly checked. Versions 2.7.6 and 3.0.0 contain a patch for this issue. As a workaround, use the session implementation by adding in the iTop config file.
- https://github.com/Combodo/iTop/commit/7757f1f2d2330d49a3ebb40194f5ec4c8eaf8186
- https://github.com/Combodo/iTop/commit/7757f1f2d2330d49a3ebb40194f5ec4c8eaf8186
- https://github.com/Combodo/iTop/security/advisories/GHSA-33pr-5776-9jqf
- https://github.com/Combodo/iTop/security/advisories/GHSA-33pr-5776-9jqf
- https://huntr.dev/bounties/0a39630d-f4b9-4468-86d8-aea3b02f91ae
- https://huntr.dev/bounties/0a39630d-f4b9-4468-86d8-aea3b02f91ae
Modified: 2024-11-21
CVE-2021-46743
In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.
Modified: 2024-11-21
CVE-2022-24780
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.
- http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html
- https://github.com/Combodo/iTop/commit/93f273a28778e5da8e51096f021d2dc1adbf4ef3
- https://github.com/Combodo/iTop/commit/93f273a28778e5da8e51096f021d2dc1adbf4ef3
- https://github.com/Combodo/iTop/commit/b6fac4b411b8d145fc30fa35c66b51243eafd06b
- https://github.com/Combodo/iTop/commit/b6fac4b411b8d145fc30fa35c66b51243eafd06b
- https://github.com/Combodo/iTop/commit/eb2a615bd28100442c7f6171707bb40884af2305
- https://github.com/Combodo/iTop/commit/eb2a615bd28100442c7f6171707bb40884af2305
- https://github.com/Combodo/iTop/security/advisories/GHSA-v97m-wgxq-rh54
- https://github.com/Combodo/iTop/security/advisories/GHSA-v97m-wgxq-rh54
- https://markus-krell.de/itop-template-injection-inside-customer-portal/
- https://markus-krell.de/itop-template-injection-inside-customer-portal/
Modified: 2024-11-21
CVE-2022-24811
Combodi iTop is a web based IT Service Management tool. Prior to versions 2.7.6 and 3.0.0, cross-site scripting is possible for scripts outside of script tags when displaying HTML attachments. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.
- https://github.com/Combodo/iTop/commit/92a9a8c65f3cbb2cd4414ca3a3b45a5754ba57b4
- https://github.com/Combodo/iTop/commit/92a9a8c65f3cbb2cd4414ca3a3b45a5754ba57b4
- https://github.com/Combodo/iTop/security/advisories/GHSA-67x5-mqg4-rvgc
- https://github.com/Combodo/iTop/security/advisories/GHSA-67x5-mqg4-rvgc
- https://huntr.dev/bounties/1625056478879-Combodo/iTop/
- https://huntr.dev/bounties/1625056478879-Combodo/iTop/
Modified: 2025-02-13
CVE-2022-24894
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony HTTP cache system, acts as a reverse proxy: It caches entire responses (including headers) and returns them to the clients. In a recent change in the `AbstractSessionListener`, the response might contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this response might bill stored and return to the next clients. An attacker can use this vulnerability to retrieve the victim's session. This issue has been patched and is available for branch 4.4.
- https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb
- https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb
- https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv
- https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv
- https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html
Modified: 2024-11-21
CVE-2022-31402
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/webservices/export-v2.php.
- https://github.com/YavuzSahbaz/CVE-2022-31402/blob/main/iTop%203.0.1%20XSS%20Vulnerability
- https://github.com/YavuzSahbaz/CVE-2022-31402/blob/main/iTop%203.0.1%20XSS%20Vulnerability
- https://sourceforge.net/projects/itop/
- https://sourceforge.net/projects/itop/
- https://www.itophub.io/
- https://www.itophub.io/
Modified: 2024-11-21
CVE-2022-31403
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.
Modified: 2024-11-21
CVE-2022-39214
Combodo iTop is an open source, web-based IT service management platform. Prior to versions 2.7.8 and 3.0.2-1, a user who can log in on iTop is able to take over any account just by knowing the account's username. This issue is fixed in versions 2.7.8 and 3.0.2-1.
- https://github.com/Combodo/iTop/commit/4c1df9927d1dc6b0181ee20721f93346def026fd
- https://github.com/Combodo/iTop/commit/4c1df9927d1dc6b0181ee20721f93346def026fd
- https://github.com/Combodo/iTop/commit/bdebea62b642622ed71410b26c81e8537e6e58fa
- https://github.com/Combodo/iTop/commit/bdebea62b642622ed71410b26c81e8537e6e58fa
- https://github.com/Combodo/iTop/security/advisories/GHSA-vj96-j84g-jhx4
- https://github.com/Combodo/iTop/security/advisories/GHSA-vj96-j84g-jhx4
Modified: 2024-11-21
CVE-2022-39216
Combodo iTop is an open source, web-based IT service management platform. Prior to versions 2.7.8 and 3.0.2-1, the reset password token is generated without any randomness parameter. This may lead to account takeover. The issue is fixed in versions 2.7.8 and 3.0.2-1.
- https://github.com/Combodo/iTop/commit/35a8b501c9e4e767ec4b36c2586f34d4ab66d229
- https://github.com/Combodo/iTop/commit/35a8b501c9e4e767ec4b36c2586f34d4ab66d229
- https://github.com/Combodo/iTop/commit/f10e9c2d64d0304777660a4f70f1e80850ea864b
- https://github.com/Combodo/iTop/commit/f10e9c2d64d0304777660a4f70f1e80850ea864b
- https://github.com/Combodo/iTop/security/advisories/GHSA-hggq-48p2-cmhm
- https://github.com/Combodo/iTop/security/advisories/GHSA-hggq-48p2-cmhm
Modified: 2024-11-21
CVE-2022-39261
Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.
- https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b
- https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b
- https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33
- https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33
- [debian-lts-announce] 20221011 [SECURITY] [DLA 3147-1] twig security update
- [debian-lts-announce] 20221011 [SECURITY] [DLA 3147-1] twig security update
- FEDORA-2022-d39b2a755b
- FEDORA-2022-d39b2a755b
- FEDORA-2022-4490a4772d
- FEDORA-2022-4490a4772d
- FEDORA-2022-9d8ee4a6de
- FEDORA-2022-9d8ee4a6de
- FEDORA-2022-c6fe3ebd94
- FEDORA-2022-c6fe3ebd94
- FEDORA-2022-73b9fb7a77
- FEDORA-2022-73b9fb7a77
- FEDORA-2022-1695454935
- FEDORA-2022-1695454935
- DSA-5248
- DSA-5248
- https://www.drupal.org/sa-core-2022-016
- https://www.drupal.org/sa-core-2022-016
Modified: 2024-11-21
CVE-2023-34447
iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, on `pages/UI.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.
- https://github.com/Combodo/iTop/commit/519751faa10b2fc5b75ea4516a1b8ef13ca35b33
- https://github.com/Combodo/iTop/commit/b8f61362f570e1ef8127175331012b7fc8aba802
- https://github.com/Combodo/iTop/security/advisories/GHSA-6rfm-2rwg-mj7p
- https://github.com/Combodo/iTop/commit/519751faa10b2fc5b75ea4516a1b8ef13ca35b33
- https://github.com/Combodo/iTop/security/advisories/GHSA-6rfm-2rwg-mj7p
- https://github.com/Combodo/iTop/commit/b8f61362f570e1ef8127175331012b7fc8aba802
Modified: 2025-02-06
CVE-2023-38511
iTop is an IT service management platform. Dashboard editor : can load multiple files and URL, and full path disclosure on dashboard config file. This vulnerability is fixed in 3.0.4 and 3.1.1.
- https://github.com/Combodo/iTop/commit/343e87a8d4fc8253fd81aeaf0dcc424b9dc4eda7
- https://github.com/Combodo/iTop/commit/343e87a8d4fc8253fd81aeaf0dcc424b9dc4eda7
- https://github.com/Combodo/iTop/commit/89145593ef2e077529a6f7ee7cde712db637e1ab
- https://github.com/Combodo/iTop/commit/89145593ef2e077529a6f7ee7cde712db637e1ab
- https://github.com/Combodo/iTop/security/advisories/GHSA-323r-chx5-m9gm
- https://github.com/Combodo/iTop/security/advisories/GHSA-323r-chx5-m9gm
- https://www.synacktiv.com/advisories/file-read-in-itop
- https://www.synacktiv.com/advisories/file-read-in-itop
Modified: 2025-02-06
CVE-2023-43790
iTop is an IT service management platform. By manipulating HTTP queries, a user can inject malicious content in the fields used for the object friendlyname value. This vulnerability is fixed in 3.1.1 and 3.2.0.
- https://github.com/Combodo/iTop/commit/03c9ffc0334fd44f3f0e82477264087064e1c732
- https://github.com/Combodo/iTop/commit/03c9ffc0334fd44f3f0e82477264087064e1c732
- https://github.com/Combodo/iTop/security/advisories/GHSA-96xm-p83r-hm97
- https://github.com/Combodo/iTop/security/advisories/GHSA-96xm-p83r-hm97
Modified: 2025-02-06
CVE-2023-44396
iTop is an IT service management platform. Dashlet edits ajax endpoints can be used to produce XSS. Fixed in iTop 2.7.10, 3.0.4, and 3.1.1.
- https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273
- https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273
- https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f
- https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f
- https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35
- https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35
Modified: 2025-02-06
CVE-2023-45808
iTop is an IT service management platform. When creating or updating an object, extkey values aren't checked to be in the current user silo. In other words, by forging an http request, the user can create objects pointing to out of silo objects (for example a UserRequest in an out of scope Organization). Fixed in iTop 2.7.10, 3.0.4, 3.1.1, and 3.2.0.
- https://github.com/Combodo/iTop/commit/5a434486443a2cf8b8a288475aada54d0a068ca7
- https://github.com/Combodo/iTop/commit/5a434486443a2cf8b8a288475aada54d0a068ca7
- https://github.com/Combodo/iTop/commit/8f61c02cbe17badff87bff9b8ada85e783c47385
- https://github.com/Combodo/iTop/commit/8f61c02cbe17badff87bff9b8ada85e783c47385
- https://github.com/Combodo/iTop/security/advisories/GHSA-245j-66p9-pwmh
- https://github.com/Combodo/iTop/security/advisories/GHSA-245j-66p9-pwmh
Modified: 2024-11-21
CVE-2023-46734
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in versions 2.0.0, 5.0.0, and 6.0.0 and prior to versions 4.4.51, 5.4.31, and 6.3.8, some Twig filters in CodeExtension use `is_safe=html` but don't actually ensure their input is safe. As of versions 4.4.51, 5.4.31, and 6.3.8, Symfony now escapes the output of the affected filters.
- https://github.com/symfony/symfony/commit/5d095d5feb1322b16450284a04d6bb48d1198f54
- https://github.com/symfony/symfony/commit/5d095d5feb1322b16450284a04d6bb48d1198f54
- https://github.com/symfony/symfony/commit/9da9a145ce57e4585031ad4bee37c497353eec7c
- https://github.com/symfony/symfony/commit/9da9a145ce57e4585031ad4bee37c497353eec7c
- https://github.com/symfony/symfony/security/advisories/GHSA-q847-2q57-wmr3
- https://github.com/symfony/symfony/security/advisories/GHSA-q847-2q57-wmr3
- https://lists.debian.org/debian-lts-announce/2023/11/msg00019.html
- https://lists.debian.org/debian-lts-announce/2023/11/msg00019.html
Modified: 2025-02-06
CVE-2023-47123
iTop is an IT service management platform. By filling malicious code in an object friendlyname / complementary name, an XSS attack can be performed when this object will displayed as an n:n relation item in another object. This vulnerability is fixed in 3.1.1 and 3.2.0.
- https://github.com/Combodo/iTop/commit/34ba4fa0ce99534f751d9f170fe0eda103e20c72
- https://github.com/Combodo/iTop/commit/34ba4fa0ce99534f751d9f170fe0eda103e20c72
- https://github.com/Combodo/iTop/security/advisories/GHSA-mx8x-693w-9hjp
- https://github.com/Combodo/iTop/security/advisories/GHSA-mx8x-693w-9hjp
Modified: 2025-02-07
CVE-2023-47622
iTop is an IT service management platform. When dashlet are refreshed, XSS attacks are possible. This vulnerability is fixed in 3.0.4 and 3.1.1.
- https://github.com/Combodo/iTop/commit/09be84f69da0fe44221f63b8c2db041bdf7dd7f9
- https://github.com/Combodo/iTop/commit/09be84f69da0fe44221f63b8c2db041bdf7dd7f9
- https://github.com/Combodo/iTop/security/advisories/GHSA-q9cm-q7fc-frxh
- https://github.com/Combodo/iTop/security/advisories/GHSA-q9cm-q7fc-frxh
Modified: 2025-02-07
CVE-2023-47626
iTop is an IT service management platform. When displaying/editing the user's personal tokens, XSS attacks are possible. This vulnerability is fixed in 3.1.1.
Modified: 2025-02-07
CVE-2023-48709
iTop is an IT service management platform. When exporting data from backoffice or portal in CSV or Excel files, users' inputs may include malicious formulas that may be imported into Excel. As Excel 2016 does **not** prevent Remote Code Execution by default, uninformed users may become victims. This vulnerability is fixed in 2.7.9, 3.0.4, 3.1.1, and 3.2.0.
- https://github.com/Combodo/iTop/commit/083a0b79bfa2c106735b5c10eddb35a05ec7f04a
- https://github.com/Combodo/iTop/commit/083a0b79bfa2c106735b5c10eddb35a05ec7f04a
- https://github.com/Combodo/iTop/commit/b10bcb976dfe8e55aa0f659bfbcdd18334a1b17c
- https://github.com/Combodo/iTop/commit/b10bcb976dfe8e55aa0f659bfbcdd18334a1b17c
- https://github.com/Combodo/iTop/security/advisories/GHSA-9q3x-9987-53x9
- https://github.com/Combodo/iTop/security/advisories/GHSA-9q3x-9987-53x9
Modified: 2025-02-07
CVE-2023-48710
iTop is an IT service management platform. Files from the `env-production` folder can be retrieved even though they should have restricted access. Hopefully, there is no sensitive files stored in that folder natively, but there could be from a third-party module. The `pages/exec.php` script as been fixed to limit execution of PHP files only. Other file types won't be retrieved and exposed. The vulnerability is fixed in 2.7.10, 3.0.4, 3.1.1, and 3.2.0.
- https://github.com/Combodo/iTop/commit/3b2da39469f7a4636ed250ed0d33f4efff38be26
- https://github.com/Combodo/iTop/commit/3b2da39469f7a4636ed250ed0d33f4efff38be26
- https://github.com/Combodo/iTop/security/advisories/GHSA-g652-q7cc-7hfc
- https://github.com/Combodo/iTop/security/advisories/GHSA-g652-q7cc-7hfc