Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-48878 β€” AI Deep Analysis Summary

CVSS 4.3 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Insecure Direct Object Reference (IDOR)** in Combodo iTop. Allows unauthorized creation of `ModuleInstallation` objects.…

Q2Root Cause? (CWE/Flaw)

πŸ” **CWE-918**: Insecure Direct Object Reference. The app exposes internal object references (like ModuleInstallation) without proper authorization checks. πŸ›‘ Flaw: No validation of user permissions before object creation.

Q3Who is affected? (Versions/Components)

⚠️ **Affected**: Combodo iTop versions **before 3.2.2**. πŸ“¦ Component: Web application core handling module installations. 🌐 All deployments using vulnerable versions are at risk.

Q4What can hackers do? (Privileges/Data)

πŸ”“ Hackers with **low privileges** (PR:L) can create `ModuleInstallation` objects. 🧩 No direct data theft (C:N), but can **alter application behavior** (I:L) β€” e.g., inject malicious modules or bypass controls.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Low exploitation threshold**. πŸ§‘β€πŸ’» Requires only low privileges (PR:L). No user interaction needed (UI:N). Exploitable remotely (AV:N). 🎯 Easy to automate.

Q6Is there a public Exp? (PoC/Wild Exploitation)

❌ **No public PoC** listed. πŸ“Œ References only point to official advisory (GHSA-rj75-7cgw-4556). 🚫 No evidence of wild exploitation reported.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-check**: Audit for `ModuleInstallation` creation endpoints. πŸ§ͺ Use tools like Burp Suite to test if low-privilege users can create modules. πŸ“Š Check logs for unexpected module installs.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Officially fixed in v3.2.2**. πŸ›‘οΈ Patch includes access control enforcement for ModuleInstallation. πŸ“¦ Upgrade to 3.2.2 or later to resolve.

Q9What if no patch? (Workaround)

πŸ› οΈ **Workaround**: Disable module installation feature if not needed. πŸ” Implement custom access control via iTop extensions. πŸ“‹ Monitor for unauthorized module creation logs.

Q10Is it urgent? (Priority Suggestion)

⚠️ **Medium urgency**. CVSS 3.1: 5.3 (L:Low, I:Low, C:None). 🚨 Not critical, but **should be patched promptly** to prevent service disruption or privilege creep. πŸ“… Prioritize if module management is active.