CVE-2021-41161

9.3 CRITICAL

📋 TL;DR

This vulnerability allows attackers to inject malicious JavaScript into CSV files exported from Combodo iTop. When users open these CSV files, the JavaScript executes in their browser context, potentially leading to session hijacking or credential theft. All users of iTop versions before 3.0.0-beta6 are affected.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: All versions prior to 3.0.0-beta6
Operating Systems: All platforms running iTop
Default Config Vulnerable: ⚠️ Yes
Notes: All iTop installations with CSV export functionality enabled are vulnerable. The vulnerability exists in the web interface's CSV export page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, redirect users to malicious sites, or perform actions on behalf of authenticated users.

🟠

Likely Case

Attackers inject malicious JavaScript that steals user session cookies or credentials when users open exported CSV files.

🟢

If Mitigated

With proper Content Security Policy headers and user awareness training, impact is limited to individual user sessions rather than system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the CSV export functionality. The vulnerability is a classic cross-site scripting (XSS) issue in CSV output.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.0-beta6 and later

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-788f-g6g9-f8fc

Restart Required: Yes

Instructions:

1. Backup your iTop installation and database. 2. Download iTop version 3.0.0-beta6 or later from the official repository. 3. Follow the iTop upgrade documentation to apply the update. 4. Restart your web server. 5. Verify the fix by testing CSV export functionality.

🔧 Temporary Workarounds

Disable CSV Export

all

Temporarily disable CSV export functionality in iTop to prevent exploitation

Modify iTop configuration to remove CSV export permissions from user roles

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to mitigate XSS impact
  • Restrict CSV export permissions to trusted administrators only

🔍 How to Verify

Check if Vulnerable:

Check your iTop version in the administration panel or by examining the version.php file. If version is below 3.0.0-beta6, you are vulnerable.

Check Version:

Check the version in iTop web interface under Administration → About, or examine the file 'version.php' in the iTop installation directory.

Verify Fix Applied:

After upgrading, test CSV export functionality and verify that user-supplied parameters are properly escaped in the output.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV export requests with JavaScript payloads in parameters
  • Multiple CSV export requests from single users in short timeframes

Network Indicators:

  • CSV file downloads containing JavaScript code
  • Requests to CSV export endpoints with suspicious parameter values

SIEM Query:

source="iTop_logs" AND ("export.php" OR "csv") AND ("script" OR "javascript" OR "onload" OR "onerror")

🔗 References

📤 Share & Export