CVE-2025-49145

8.7 HIGH

📋 TL;DR

A privilege escalation vulnerability in Combodo iTop allows authenticated users with webhook creation permissions (typically administrators) to execute arbitrary database operations, including dropping the entire database. This affects iTop versions before 2.7.13 and 3.2.2. The vulnerability stems from insufficient validation of callback signatures in webhook functionality.

💻 Affected Systems

Products:
  • Combodo iTop
Versions: All versions before 2.7.13 and 3.2.2
Operating Systems: All platforms running iTop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user with webhook creation permissions (typically administrator role).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database destruction leading to permanent data loss, service disruption, and potential compromise of sensitive IT service management information.

🟠

Likely Case

Malicious administrator or compromised admin account drops critical database tables, causing extended downtime and data recovery challenges.

🟢

If Mitigated

Limited impact with proper access controls, database backups, and monitoring in place to detect and respond to unauthorized database operations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with webhook creation privileges. The vulnerability is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.13 or 3.2.2

Vendor Advisory: https://github.com/Combodo/iTop/security/advisories/GHSA-55q8-mfxr-pq4j

Restart Required: Yes

Instructions:

1. Backup your iTop installation and database. 2. Download iTop 2.7.13 or 3.2.2 from official sources. 3. Follow the iTop upgrade documentation for your version. 4. Verify the callback signature verification is enabled in webhook configuration.

🔧 Temporary Workarounds

Restrict Webhook Permissions

all

Temporarily remove webhook creation permissions from all users until patching is complete.

Edit iTop user profiles to remove 'Create Webhook' permission

Database Access Controls

all

Implement database-level restrictions to prevent DROP operations from the iTop application user.

REVOKE DROP ON *.* FROM 'itop_user'@'localhost';

🧯 If You Can't Patch

  • Implement strict principle of least privilege for iTop administrator accounts
  • Enable comprehensive database backup and monitoring for DROP operations

🔍 How to Verify

Check if Vulnerable:

Check iTop version in the application interface or configuration files. Versions below 2.7.13 or 3.2.2 are vulnerable.

Check Version:

Check the 'itop-version.php' file or application dashboard for version information.

Verify Fix Applied:

Verify version is 2.7.13 or higher (for 2.x branch) or 3.2.2 or higher (for 3.x branch). Check that webhook callback signature verification is enabled in configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DROP DATABASE or DROP TABLE statements in database logs
  • Webhook creation or modification events from unexpected users
  • Database connection errors or missing tables

Network Indicators:

  • Unusual database traffic patterns from iTop application server
  • Multiple failed database operations followed by DROP commands

SIEM Query:

source="database_logs" AND (DROP DATABASE OR DROP TABLE) AND source_ip="iTop_server_ip"

🔗 References

📤 Share & Export