CVE-2021-21407

8.0 HIGH

📋 TL;DR

CVE-2021-21407 is a Cross-Site Request Forgery (CSRF) vulnerability in Combodo iTop that allows attackers to bypass CSRF token validation through a tricky browser procedure. This enables attackers to perform unauthorized actions on behalf of authenticated users. All iTop installations prior to version 2.7.4 are affected.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: All versions prior to 2.7.4
Operating Systems: All platforms running iTop
Default Config Vulnerable: ⚠️ Yes
Notes: All iTop installations with default configurations are vulnerable. The vulnerability affects the iTop portal interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could perform administrative actions like creating new privileged accounts, modifying configurations, or deleting critical data, potentially leading to complete system compromise.

🟠

Likely Case

Attackers trick authenticated users into performing unintended actions like changing their password, modifying tickets, or altering user permissions.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is limited to specific targeted actions requiring user interaction.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires tricking an authenticated user into visiting a malicious page. The advisory describes a specific browser procedure to bypass CSRF tokens.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.4 or 3.0.0

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-9wq8-4qm9-3j6f

Restart Required: Yes

Instructions:

1. Backup your iTop installation and database. 2. Download iTop version 2.7.4 or 3.0.0 from the official repository. 3. Follow the iTop upgrade documentation to apply the patch. 4. Restart the web server service.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

all

Add additional CSRF protection headers to web server configuration

# For Apache: Add 'Header set X-Frame-Options DENY' to .htaccess
# For Nginx: Add 'add_header X-Frame-Options DENY;' to server config

Session Timeout Reduction

all

Reduce session timeout to limit exposure window

# In iTop configuration file, reduce 'session_timeout' parameter

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate users about phishing risks and implement strict access controls for sensitive operations

🔍 How to Verify

Check if Vulnerable:

Check iTop version in the web interface footer or configuration files. If version is below 2.7.4, the system is vulnerable.

Check Version:

grep 'ITOP_VERSION' /path/to/iTop/config-itop.php

Verify Fix Applied:

After patching, verify version shows 2.7.4 or higher in the web interface. Test CSRF protection by attempting to submit forms without valid tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed CSRF token validations from same IP
  • Unusual administrative actions from non-admin users
  • Requests with missing or malformed CSRF tokens

Network Indicators:

  • POST requests without Referer headers
  • Requests with suspicious Origin headers
  • Multiple form submissions from same session in short time

SIEM Query:

source="iTop_logs" AND (message="CSRF token validation failed" OR message="Invalid CSRF token") | stats count by src_ip

🔗 References

📤 Share & Export