CVE-2024-51994

5.4 MEDIUM

📋 TL;DR

This CVE describes a stored cross-site scripting (XSS) vulnerability in Combodo iTop's portal where uploading a text file containing JavaScript can execute malicious code in users' browsers. All users of affected iTop versions are vulnerable. Attackers could steal session cookies, perform actions as authenticated users, or deface the portal.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: All versions before 3.2.0
Operating Systems: All platforms running iTop
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the portal component of iTop, not the main application. Requires file upload functionality to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full administrative access to the iTop instance, modifies configurations, accesses sensitive IT service management data, and potentially pivots to other systems.

🟠

Likely Case

Attacker uploads malicious file via portal, steals session cookies from users who view/download the file, impersonates those users to access or modify service tickets and IT assets.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before execution, limiting impact to file upload functionality disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to upload files via the portal interface. The advisory suggests the vulnerability is in how uploaded text files are processed and displayed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.0

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-jjph-c25g-5c7g

Restart Required: Yes

Instructions:

1. Backup your iTop instance and database. 2. Download iTop version 3.2.0 or later from official sources. 3. Follow the iTop upgrade documentation to apply the update. 4. Restart your web server. 5. Verify the portal functionality works correctly.

🔧 Temporary Workarounds

Disable portal file uploads

all

Temporarily disable file upload functionality in the iTop portal configuration to prevent exploitation.

Modify portal configuration files to remove or restrict file upload capabilities

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to block inline script execution
  • Deploy a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check your iTop version via the administration interface or by examining the installation directory. Versions below 3.2.0 are vulnerable.

Check Version:

Check the 'itop/version.php' file or the 'About' section in the iTop administration interface

Verify Fix Applied:

After upgrading to 3.2.0 or later, test file upload functionality in the portal with test scripts to ensure they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to portal endpoints
  • JavaScript content in uploaded text files
  • Multiple failed upload attempts with script-like content

Network Indicators:

  • POST requests to portal upload endpoints containing JavaScript
  • Subsequent requests with stolen session cookies

SIEM Query:

source="iTop_logs" AND (url_path="/portal/upload" OR message="file upload") AND (message CONTAINS "script" OR message CONTAINS "javascript")

🔗 References

📤 Share & Export