CVE-2024-51740

4.3 MEDIUM

📋 TL;DR

This vulnerability in Combodo iTop allows low-privileged users to make HTTP requests on behalf of the server, potentially leading to server-side request forgery (SSRF). It affects iTop installations with vulnerable versions of the user portal form manager. Users of affected iTop versions are at risk.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: Versions before 2.7.11, 3.0.5, 3.1.2, and 3.2.0
Operating Systems: All platforms running iTop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged user access to the iTop user portal.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could use SSRF to access internal services, perform port scanning, or interact with cloud metadata services to escalate privileges or steal sensitive data.

🟠

Likely Case

Low-privileged users could probe internal network services, potentially discovering other vulnerable systems or accessing limited internal resources.

🟢

If Mitigated

With proper network segmentation and least-privilege access controls, impact would be limited to the iTop server's network perspective only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated low-privileged access and knowledge of the vulnerable form manager component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.11, 3.0.5, 3.1.2, or 3.2.0 depending on your version

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-w9g8-mxm5-ph62

Restart Required: Yes

Instructions:

1. Identify your current iTop version. 2. Backup your iTop installation and database. 3. Download the appropriate patched version from the official iTop repository. 4. Follow iTop's upgrade documentation for your version. 5. Restart the web server service.

🧯 If You Can't Patch

  • Restrict low-privileged user access to the iTop user portal if not required.
  • Implement network controls to limit the iTop server's outbound HTTP connections to only necessary services.

🔍 How to Verify

Check if Vulnerable:

Check your iTop version in the application interface or by examining the installation directory. Compare against affected versions.

Check Version:

Check the iTop web interface admin panel or examine the 'config-itop.php' file for version information.

Verify Fix Applied:

After upgrading, verify the version shows as 2.7.11, 3.0.5, 3.1.2, or 3.2.0 or higher in the iTop interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests originating from the iTop server IP
  • Multiple failed connection attempts to internal services from iTop

Network Indicators:

  • HTTP traffic from iTop server to unexpected internal IPs or services
  • Port scanning patterns originating from iTop server

SIEM Query:

source="iTop_logs" AND (http_request OR outbound_connection) AND NOT destination IN [allowed_services]

🔗 References

📤 Share & Export