iTop 2.2.1 Cross Site Request Forgery

Discussion in 'News Aggregator' started by Packet Storm, 19 Mar 2016.

  1. Packet Storm

    Packet Storm Guest

    High-Tech Bridge Security Research Lab discovered a remote code execution vulnerability in iTop that is exploitable via cross site request forgery flaw that is also present in the application. The vulnerability exists due to absence of validation of HTTP request origin in "/env-production/itop-config/config.php" script, as well as lack of user-input sanitization received via "new_config" HTTP POST parameter.

    Continue reading...
     

Share This Page

Loading...