6.5
CVSSv2

CVE-2022-24780

Published: 05/04/2022 Updated: 07/10/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Combodo iTop is a web based IT Service Management tool. In versions before 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

combodo itop 3.0.0

combodo itop

Exploits

iTop versions prior to 275 authenticated remote command execution exploit ...

Github Repositories

iTop < 2.7.6 - (Authenticated) Remote command execution

iTop RCE via SSTI - CVE-2022-24780 exploit iTop &lt; 276 - (Authenticated) Remote command execution Exploit for CVE-2022-24780 [EDB-TODO] [PacketStorm] [WLB-2022050075] Usage $ ruby exploitrb -h iTop &lt; 276 - (Authenticated) Remote command execution Usage: exploitrb full &lt;url&gt; &lt;username&gt; &lt;password&gt; &lt;cmd&