In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.itophub.io/wiki/page?id=2_7_0%3Arelease%3Achange_log | release notes vendor advisory |
https://github.com/Combodo/iTop/security/advisories/GHSA-4h6p-jghj-8qxm | third party advisory |