Vulnerability identifier: #VU41597
Vulnerability risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-269
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
iTop
Web applications /
Other software
Vendor: Combodo
Description
The vulnerability allows a remote user to escalate privileges within the application.
A post-authentication privilege escalation in the web application of Combodo iTop allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
iTop: 2.5.0 - 2.6.1
External links
http://github.com/Combodo/iTop/security/advisories/GHSA-2gfp-2qvh-9796
http://www.combodo.com/itop-193
http://www.pentagrid.ch/de/blog/security_issues_in_teampasswordmanager_and_combodo_itop/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.