#VU41597 Improper Privilege Management in iTop


Published: 2020-08-10

Vulnerability identifier: #VU41597

Vulnerability risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-19821

CWE-ID: CWE-269

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
iTop
Web applications / Other software

Vendor: Combodo

Description

The vulnerability allows a remote user to escalate privileges within the application.

A post-authentication privilege escalation in the web application of Combodo iTop allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

iTop: 2.5.0 - 2.6.1


External links
http://github.com/Combodo/iTop/security/advisories/GHSA-2gfp-2qvh-9796
http://www.combodo.com/itop-193
http://www.pentagrid.ch/de/blog/security_issues_in_teampasswordmanager_and_combodo_itop/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability