{"id":"CVE-2024-51995","summary":"Logic bug in ajax.render.php allows for bypass of 'backOffice' access control in Combodo iTop","details":"Combodo iTop is a web based IT Service Management tool. An attacker can request any `route` we want as long as we specify an `operation` that is allowed. This issue has been addressed in version 3.2.0 by applying the same access control pattern as in `UI.php` to the `ajax.render.php` page which does not allow arbitrary `routes` to be dispatched. All users are advised to upgrade. There are no known workarounds for this vulnerability.","aliases":["GHSA-3mxr-8r3j-j2j9"],"modified":"2026-04-10T05:14:58.788133Z","published":"2024-11-07T17:55:15.598Z","database_specific":{"cwe_ids":["CWE-284"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/51xxx/CVE-2024-51995.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/51xxx/CVE-2024-51995.json"},{"type":"ADVISORY","url":"https://github.com/Combodo/iTop/security/advisories/GHSA-3mxr-8r3j-j2j9"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-51995"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/combodo/itop","events":[{"introduced":"0"},{"fixed":"0ee1818f12583de75babc5c9e4fd6428cc8fdb73"}]}],"versions":["2.7.0-alpha1","2.7.0-beta","2.7.0-beta2","3.1.0-alpha1","3.2.0-alpha1","3.2.0-rc1","3.2.0-rc2","3.2.0-rc3","ITSM_Designer_3.1-compatibility"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-51995.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N"}]}