CVE-2023-48710

9.8 CRITICAL

📋 TL;DR

CVE-2023-48710 is a critical directory traversal vulnerability in iTop IT service management platform that allows unauthenticated attackers to access restricted files from the env-production folder. This affects all iTop installations with vulnerable versions, potentially exposing sensitive configuration files or credentials stored by third-party modules.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: All versions before 2.7.10, 3.0.4, 3.1.1, and 3.2.0
Operating Systems: All platforms running iTop
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installations. Risk increases if third-party modules store sensitive files in env-production folder.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers retrieve sensitive configuration files containing database credentials, API keys, or other secrets, leading to complete system compromise and data exfiltration.

🟠

Likely Case

Attackers access configuration files that may contain sensitive information, potentially enabling further attacks or data leakage.

🟢

If Mitigated

No sensitive files are exposed if env-production folder contains only non-sensitive files and proper access controls are implemented.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated access, making internet-facing instances particularly vulnerable to automated scanning and exploitation.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or compromised internal systems, though attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple directory traversal attack via pages/exec.php. No authentication required. CVSS 9.8 indicates trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.10, 3.0.4, 3.1.1, or 3.2.0

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-g652-q7cc-7hfc

Restart Required: No

Instructions:

1. Backup your iTop installation and database. 2. Download the patched version from official iTop repository. 3. Replace vulnerable files with patched versions. 4. Verify the fix by checking version and testing access restrictions.

🔧 Temporary Workarounds

Restrict access to pages/exec.php

all

Block or restrict access to the vulnerable script using web server configuration or WAF rules.

# Apache: <Location /pages/exec.php> Require all denied </Location>
# Nginx: location ~ /pages/exec\.php$ { deny all; }

Remove sensitive files from env-production

all

Audit and remove any sensitive files from the env-production folder to reduce impact if exploited.

# Review env-production contents: ls -la /path/to/itop/env-production/
# Remove sensitive files if found

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to iTop instances
  • Deploy web application firewall (WAF) with directory traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[iTop-url]/pages/exec.php?exec_env=production&exec_module=install&exec_page=config.php (or similar env-production files). If files are returned, system is vulnerable.

Check Version:

Check iTop version in setup page or configuration: grep 'ITOP_VERSION' /path/to/itop/approot.inc.php

Verify Fix Applied:

After patching, attempt the same access test. Should receive access denied or proper error message instead of file contents.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to pages/exec.php with exec_env=production parameter
  • Unusual file access patterns to env-production folder

Network Indicators:

  • HTTP requests to /pages/exec.php with exec_env=production parameter
  • Traffic patterns indicating directory traversal attempts

SIEM Query:

source="web_access.log" AND uri="/pages/exec.php" AND query="*exec_env=production*"

🔗 References

📤 Share & Export