- Notifications
You must be signed in to change notification settings - Fork244
Security: Combodo/iTop
Security
SECURITY.md
We take all security bugs seriously. Thank you for improving the security of iTop! We appreciate your efforts andresponsible disclosure and will make every effort to acknowledge your contributions.
Please send a procedure to reproduce iTop vulnerabilities toitop-security@combodo.com.
You can send us a standard "given / when / then" report, including iTop version, impacts, and maybe installed modules or data if they areneeded to reproduce.
Report security bugs in third-party modules to the person or team maintaining the module, and notify us of this report by sending an emailtoitop-security@combodo.com.
Report sent to us will be acknowledged within the week.
Then, a Combodo developer will be assigned to the reported issue and will:
- confirm the problem and determine the affected iTop versions
- audit the code to search any potential similar problems
- try to find a workaround if any
- create fixes for all releases still under maintenance
- send you the commit(s) for review
- send you the next version(s) that will contain the fix, and the estimated release dates
Security issues always take precedence over bug fixes and feature work.
The assignee will keep you informed of the resolution progress, and may ask you for additional information or guidance.
Once the fix is done and acknowledged by every stakeholder, it will be included in the next iTop version.
Mind we have at least 2 active branches (LTS and STS, seeiTop Community Releases [iTop Documentation])
The release communications will include the information of the vulnerability fix.
Corresponding GitHub advisories and CVE will be published 3 months after the iTop version release date so that iTop instances can be updated.
- Stored Self XSS in preferencesGHSA-c6mg-9537-c8cf published
Feb 25, 2025 byBenGrenobleModerate - XSS leading to CSRF breach on _table_id parameterGHSA-jmv2-wfh5-h5wg published
Dec 13, 2024 byBenGrenobleHigh - Cross-Site Request Forgery (CSRF) in several iTop pagesGHSA-xr4x-xq7v-7gqm published
Nov 8, 2024 byBenGrenobleHigh - Portal user is able to access forbidden services informationsGHSA-9p26-v3wj-6q34 published
Nov 8, 2024 byBenGrenobleModerate - Reflected XSS exploit : Editing a request's payload can lead to malicious JS - local and remote - execution.GHSA-r58g-p5r9-8hfg published
Nov 8, 2024 byBenGrenobleHigh - Logic bug in ajax.render.php allows for bypass of 'backOffice' access controlGHSA-3mxr-8r3j-j2j9 published
Nov 7, 2024 byBenGrenobleHigh - Self XSS in portal picture uploadGHSA-jjph-c25g-5c7g published
Nov 7, 2024 byBenGrenobleHigh - Password is stored in clear in the databaseGHSA-9mq5-349x-x427 published
Nov 7, 2024 byBenGrenobleLow - iTop Hub connector Information disclosureGHSA-rfjh-2f5x-qxmx published
Nov 4, 2024 byBenGrenobleModerate - Users enumeration allowed through Rest APIGHSA-2hmf-p27w-phf9 published
Nov 5, 2024 byBenGrenobleHigh