{"vuid":"VU#338956","idnumber":"338956","name":"DOMIT! RSS testing_domitrss.php discloses local files","keywords":["trixbox","SugarCRM","information disclosure","testing_domitrss.php"],"overview":"A vulnerability in DOMIT! RSS allows an attacker to read local files.","clean_desc":"DOMIT! RSS is an RSS parser for PHP. DOMIT! RSS includes a test script called testing_domitrss.php. This script writes out the contents of any user-supplied URL to a local file named the MD5 hash of the URL (e.g., md5 -s [string]). The script doesn't validate the user-supplied URL, so an attacker can provide any string as input, such as a  local file (e.g., /etc/passwd) and predictably know the name of the file to access it. DOMIT! RSS Parser is included as a component in other software packages, notably trixbox and SugarCRM. Reports indicate scanning activity for vulnerable trixbox installations.","impact":"An unauthenticated remote attacker could read any file accessible to the user executing testing_domitrss.php (typically the web server process).","resolution":"Remove testing_domitrss.php Remove testing_domitrss.php from production systems. Update trixbox has reported that this functionality has been removed in trixbox 2.8. testing_domitrss.php is not present in trixbox 2.6.22. The script is present in trixbox 2.2.12. In limited testing, at least one trixbox version the script was present but read access to files is denied by the web server configuration. SugarCRM fixed a similar vulnerability in versions 4.5.1j and 5.0.0c.","workarounds":"","sysaffected":"Any software that uses DOMIT! RSS may be affected, not only","thanks":"","author":"This document was written by Art Manion.","public":["http://sourceforge.net/projects/domit-rssparser/","http://isc.sans.edu/diary.html?storyid=5782","http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2008-04/msg00309.html","http://www.security-assessment.com/files/advisories/2008-04-29_SugarCRM_local_file_disclosure.pdf"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2009-02-04T20:12:54Z","publicdate":"2009-02-04T00:00:00Z","datefirstpublished":"2013-01-11T23:35:27Z","dateupdated":"2013-01-11T23:43:22Z","revision":19,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"6.2","cvss_environmentalscore":"1.6","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}