CVE-2024-51739

7.5 HIGH

📋 TL;DR

CVE-2024-51739 is an information disclosure vulnerability in Combodo iTop that allows unauthenticated attackers to enumerate valid user accounts via the password reset functionality. This affects all iTop installations with vulnerable versions, making brute-force attacks more effective. The vulnerability exposes whether specific usernames exist in the system.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: All versions before 2.7.11, 3.0.5, 3.1.2, and 3.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All iTop installations with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can enumerate all valid user accounts and then perform targeted brute-force attacks to compromise credentials, leading to unauthorized access and potential privilege escalation.

🟠

Likely Case

Attackers identify valid usernames and perform dictionary attacks against those accounts, potentially gaining unauthorized access to the iTop system.

🟢

If Mitigated

With proper controls like account lockouts, strong passwords, and network segmentation, the impact is limited to information disclosure without credential compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and involves simple HTTP requests to the password reset endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.11, 3.0.5, 3.1.2, or 3.2.0

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-2hmf-p27w-phf9

Restart Required: Yes

Instructions:

1. Backup your iTop installation and database. 2. Download the patched version from the official iTop repository. 3. Follow the iTop upgrade documentation for your version. 4. Verify the fix by testing the password reset functionality.

🔧 Temporary Workarounds

Custom Dictionary Entry Override

all

Override the vulnerable dictionary entry with a generic message through an iTop extension

Create an extension that overloads the dictionary entry "UI:ResetPwd-Error-WrongLogin" with a generic message

🧯 If You Can't Patch

  • Implement network-level controls to restrict access to the password reset endpoint
  • Enable account lockout policies and implement strong password requirements

🔍 How to Verify

Check if Vulnerable:

Test the password reset functionality with valid and invalid usernames. If different error messages are returned for valid vs invalid users, the system is vulnerable.

Check Version:

Check the iTop configuration file or admin interface for version information

Verify Fix Applied:

After patching, test password reset with valid and invalid usernames. Both should return identical generic error messages.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password reset attempts with different usernames
  • Unusual patterns of requests to /pages/UI.php?operation=reset_password

Network Indicators:

  • High volume of POST requests to password reset endpoint from single IPs
  • Pattern of sequential username attempts

SIEM Query:

source="iTop_logs" AND (uri="/pages/UI.php?operation=reset_password" OR message="password reset") | stats count by src_ip

🔗 References

📤 Share & Export