First published: Sat Nov 26 2011(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in iTop (aka IT Operations Portal) 1.1.181 and 1.2.0-RC-282 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted company name, (2) a crafted database server name, (3) a crafted CSV file, (4) a crafted copy-and-paste action, (5) the auth_user parameter in a suggest_pwd action to UI.php, (6) the c[menu] parameter to UniversalSearch.php, (7) the description parameter in a SearchFormToAdd_document_list action to UI.php, (8) the category parameter in an errors action to audit.php, or (9) the suggest_pwd parameter to UI.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
iTop | =1.1.181 | |
iTop | =1.2.0-rc282 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4275 is classified as a moderate severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2011-4275, upgrade to a version of iTop that is not vulnerable, specifically any version released after 1.2.0-RC-282.
CVE-2011-4275 can be exploited through crafted company names, database server names, CSV files, and other user inputs.
CVE-2011-4275 affects users of iTop version 1.1.181 and 1.2.0-RC-282.
An attacker exploiting CVE-2011-4275 can inject arbitrary web script or HTML, potentially compromising user data and application integrity.