Combodo iTop is a web based IT Service Management tool. An attacker can request any `route` we want as long as we specify an `operation` that is allowed. This issue has been addressed in version 3.2.0 by applying the same access control pattern as in `UI.php` to the `ajax.render.php` page which does not allow arbitrary `routes` to be dispatched. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Combodo iTop is a web based IT Service Management tool. An attacker can request any `route` we want as long as we specify an `operation` that is allowed. This issue has been addressed in version 3.2.0 by applying the same access control pattern as in `UI.php` to the `ajax.render.php` page which does not allow arbitrary `routes` to be dispatched. All users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Logic bug in ajax.render.php allows for bypass of 'backOffice' access control in Combodo iTop | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-07T17:55:15.598Z
Updated: 2024-11-07T18:16:51.358Z
Reserved: 2024-11-04T17:46:16.776Z
Link: CVE-2024-51995
Vulnrichment
Updated: 2024-11-07T18:16:42.580Z
NVD
Status : Awaiting Analysis
Published: 2024-11-07T18:15:18.787
Modified: 2024-11-08T19:01:03.880
Link: CVE-2024-51995
Redhat
No data.