CVE-2024-51995
📋 TL;DR
This vulnerability in Combodo iTop allows attackers to bypass access controls by specifying arbitrary routes through allowed operations. It affects all iTop users running versions before 3.2.0, enabling unauthorized access to functionality that should be restricted.
💻 Affected Systems
- Combodo iTop
📦 What is this software?
Itop by Combodo
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through privilege escalation, data exfiltration, or service disruption by accessing administrative functions.
Likely Case
Unauthorized access to sensitive data or functionality that should be restricted based on user roles.
If Mitigated
Limited impact if proper network segmentation and access controls are in place, but still represents a security bypass.
🎯 Exploit Status
Requires some authentication but can bypass authorization controls once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.2.0
Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-3mxr-8r3j-j2j9
Restart Required: Yes
Instructions:
1. Backup your iTop installation and database. 2. Download iTop version 3.2.0 or later. 3. Follow the official iTop upgrade procedure. 4. Restart the web server service.
🧯 If You Can't Patch
- Implement strict network access controls to limit iTop access to authorized users only.
- Monitor authentication and authorization logs for suspicious access patterns.
🔍 How to Verify
Check if Vulnerable:
Check iTop version in the web interface or configuration files. Versions before 3.2.0 are vulnerable.
Check Version:
Check the iTop web interface or examine the 'itop-version.php' file in the installation directory.
Verify Fix Applied:
Verify iTop version is 3.2.0 or later and test that unauthorized route access is properly blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to ajax.render.php with unexpected route parameters
- Authorization failures for routes that should be accessible
Network Indicators:
- HTTP requests to ajax.render.php with unusual route parameters
- Increased traffic to administrative endpoints from non-admin users
SIEM Query:
web.url: "*ajax.render.php*" AND web.query: "*route=*" AND NOT user.role: "admin"