{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0ee1818f12583de75babc5c9e4fd6428cc8fdb73"
            }
          ],
          "repo": "https://github.com/combodo/itop",
          "type": "GIT"
        }
      ]
    }
  ],
  "aliases": [
    "GHSA-3mxr-8r3j-j2j9"
  ],
  "database_specific": {
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
      "CWE-284"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/51xxx/CVE-2024-51995.json"
  },
  "details": "Combodo iTop is a web based IT Service Management tool. An attacker can request any `route` we want as long as we specify an `operation` that is allowed. This issue has been addressed in version 3.2.0 by applying the same access control pattern as in `UI.php` to the `ajax.render.php` page which does not allow arbitrary `routes` to be dispatched. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
  "id": "CVE-2024-51995",
  "modified": "2025-12-04T02:33:57.948857957Z",
  "published": "2024-11-07T17:55:15.598Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/51xxx/CVE-2024-51995.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-3mxr-8r3j-j2j9"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51995"
    }
  ],
  "schema_version": "1.7.3",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Logic bug in ajax.render.php allows for bypass of 'backOffice' access control in Combodo iTop"
}