CVE-2022-24870

8.7 HIGH

📋 TL;DR

This vulnerability allows authorized users of Combodo iTop to inject malicious scripts into tooltips via the customization mechanism, creating a stored cross-site scripting (XSS) attack vector. The attack can be executed by authenticated users with customization privileges, potentially compromising other users' sessions or stealing sensitive data.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: 3.0.0 beta releases prior to 3.0.0 beta3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects beta versions of iTop 3.0.0; requires authorized user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with authorized access could inject malicious scripts that execute in other users' browsers, leading to session hijacking, credential theft, data exfiltration, or complete compromise of user accounts.

🟠

Likely Case

Authorized malicious users or compromised accounts could inject scripts to steal session cookies, perform actions as other users, or deface the application interface.

🟢

If Mitigated

With proper input validation and output encoding, the script injection would be neutralized, preventing execution in user browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authorized access to the iTop customization mechanism; the advisory provides technical details but no public exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.0 beta3 or later

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-29h7-jw2p-pcw3

Restart Required: Yes

Instructions:

1. Backup your iTop installation and database. 2. Download iTop version 3.0.0 beta3 or later from the official repository. 3. Replace the existing installation files with the patched version. 4. Restart the web server service. 5. Verify the update by checking the version in the iTop interface.

🧯 If You Can't Patch

  • Restrict user permissions to prevent unauthorized access to customization features.
  • Implement web application firewall (WAF) rules to block XSS payloads in tooltip inputs.

🔍 How to Verify

Check if Vulnerable:

Check the iTop version in the application interface or configuration files; if it's 3.0.0 beta, beta1, or beta2, it is vulnerable.

Check Version:

Check the 'itop-version.php' file or the application's admin interface for version information.

Verify Fix Applied:

After patching, verify the version is 3.0.0 beta3 or later and test tooltip customization for script injection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual tooltip customization requests containing script tags or JavaScript code in POST data.
  • Multiple failed XSS attempts in web server logs.

Network Indicators:

  • HTTP requests to customization endpoints with suspicious payloads in parameters.

SIEM Query:

source="web_server_logs" AND (uri_path="/pages/exec.php" OR uri_path LIKE "%/tooltip%") AND (http_method="POST" OR http_method="GET") AND (request_body LIKE "%<script>%" OR request_body LIKE "%javascript:%" OR parameters LIKE "%onerror=%")

🔗 References

📤 Share & Export