Description
Multiple cross-site scripting (XSS) vulnerabilities in iTop (aka IT Operations Portal) 1.1.181 and 1.2.0-RC-282 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted company name, (2) a crafted database server name, (3) a crafted CSV file, (4) a crafted copy-and-paste action, (5) the auth_user parameter in a suggest_pwd action to UI.php, (6) the c[menu] parameter to UniversalSearch.php, (7) the description parameter in a SearchFormToAdd_document_list action to UI.php, (8) the category parameter in an errors action to audit.php, or (9) the suggest_pwd parameter to UI.php.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/29210
exploitdb
WORKING POC
VERIFIED
by Halim Cruzito · textwebappsphp
https://www.exploit-db.com/exploits/29091
exploitdb
WORKING POC
VERIFIED
by iskorpitx · textwebappsphp
https://www.exploit-db.com/exploits/24969
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/24529
exploitdb
WORKING POC
VERIFIED
by LiquidWorm · phpwebappsphp
https://www.exploit-db.com/exploits/24492
References (3)
Core 3
Core References
Exploit mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/520632
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/520632/100/0/threaded
Exploit x_refsource_misc
http://www.tele-consulting.com/advisories/TC-SA-2011-02.txt
Scores
EPSS
0.0058
EPSS Percentile
69.0%
Details
VulnCheck KEV
2020-07-08
CWE
CWE-79
Status
published
Products (2)
combodo/itop
1.1.181
combodo/itop
1.2.0 rc282
Published
Nov 26, 2011
Tracked Since
Feb 18, 2026