First published: Mon Aug 10 2020(Updated: )
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Combodo iTop | <2.7.1 | |
Combodo iTop | =3.0.0-alpha | |
Combodo iTop | =3.0.0-beta | |
Combodo iTop | =3.0.0-beta1 | |
Combodo iTop | =3.0.0-beta2 | |
Combodo iTop | =3.0.0-beta3 | |
Combodo iTop | =3.0.0-beta4 | |
Combodo iTop | =3.0.0-beta5 | |
Combodo iTop | =3.0.0-beta6 | |
Combodo iTop | =3.0.0-beta7 | |
Combodo iTop | =3.0.0-beta8 | |
Combodo iTop | =3.0.0-rc |
Update to version 2.7.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12777 is a vulnerability in Combodo iTop that allows unauthorized attackers to inject command and disclose system information.
Combodo iTop versions up to and including 3.0.0 are affected by CVE-2020-12777.
CVE-2020-12777 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2020-12777 by injecting commands and gaining unauthorized access to system information.
You can find more information about CVE-2020-12777 in the following references: [CVE-2020-12777 GitHub Advisory](https://github.com/Combodo/iTop/security/advisories/GHSA-88fq-r22m-64q2) and [CVE-2020-12777 TW-CERT Advisory](https://www.twcert.org.tw/tw/cp-132-3833-46ae7-1.html).