ID

VAR-200808-0340


CVE

CVE-2008-3458


TITLE

Vtiger CRM Vulnerable to reading email merge templates

Trust: 0.8

sources: JVNDB: JVNDB-2006-003712

DESCRIPTION

Vtiger CRM before 5.0.4 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read mail merge templates via a direct request to the wordtemplatedownload directory. vtiger CRM is prone to an information-disclosure vulnerability because the application fails to properly sanitize user-supplied input. A remote attacker may exploit this vulnerability to retrieve arbitrary files that may contain potentially sensitive information. Information harvested may be used in further attacks. This issue affects versions prior to vtiger CRM 5.0.4 RC. Vtiger CRM is an open source web-based customer relationship management system (CRM) based on Sales Force Automation (SFA). ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: vtiger CRM File Disclosure Vulnerability SECUNIA ADVISORY ID: SA28370 VERIFY ADVISORY: http://secunia.com/advisories/28370/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information WHERE: >From remote SOFTWARE: vtiger CRM 5.x http://secunia.com/product/14762/ DESCRIPTION: A vulnerability has been reported in vtiger CRM, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to the application not correctly restricting access to e.g. the /test/wordtemplatedownload directory, which can be exploited to list and download directory contents. SOLUTION: Restrict access to affected directories (e.g. via ".htaccess"). Renaming this file to ".htaccess" prohibits the listing of directory content. PROVIDED AND/OR DISCOVERED BY: Reported in a bug by "pieper". ORIGINAL ADVISORY: http://sourceforge.net/project/shownotes.php?release_id=567189 Bug #2107: http://trac.vtiger.com/cgi-bin/trac.cgi/ticket/2107 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2008-3458 // JVNDB: JVNDB-2006-003712 // BID: 27228 // VULHUB: VHN-33583 // VULMON: CVE-2008-3458 // PACKETSTORM: 62490

AFFECTED PRODUCTS

vendor:vtigermodel:crmscope:lteversion:5.0.3

Trust: 1.0

vendor:vtigermodel:crmscope:eqversion:5.0.3

Trust: 0.9

vendor:vtigermodel:crmscope:ltversion:5.0.4

Trust: 0.8

vendor:vtigermodel:crmscope:eqversion:4.2.4

Trust: 0.3

vendor:vtigermodel:crmscope:eqversion:4.2

Trust: 0.3

vendor:vtigermodel:crm rcscope:neversion:5.0.4

Trust: 0.3

sources: BID: 27228 // JVNDB: JVNDB-2006-003712 // CNNVD: CNNVD-200808-046 // NVD: CVE-2008-3458

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3458
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-3458
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200808-046
value: MEDIUM

Trust: 0.6

VULHUB: VHN-33583
value: MEDIUM

Trust: 0.1

VULMON: CVE-2008-3458
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-3458
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-33583
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33583 // VULMON: CVE-2008-3458 // JVNDB: JVNDB-2006-003712 // CNNVD: CNNVD-200808-046 // NVD: CVE-2008-3458

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-33583 // JVNDB: JVNDB-2006-003712 // NVD: CVE-2008-3458

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200808-046

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200808-046

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-003712

PATCH

title:2107url:http://trac.vtiger.com/cgi-bin/trac.cgi/ticket/2107

Trust: 0.8

sources: JVNDB: JVNDB-2006-003712

EXTERNAL IDS

db:NVDid:CVE-2008-3458

Trust: 2.9

db:BIDid:27228

Trust: 2.1

db:SECUNIAid:28370

Trust: 1.9

db:OSVDBid:40218

Trust: 1.8

db:JVNDBid:JVNDB-2006-003712

Trust: 0.8

db:CNNVDid:CNNVD-200808-046

Trust: 0.6

db:VULHUBid:VHN-33583

Trust: 0.1

db:VULMONid:CVE-2008-3458

Trust: 0.1

db:PACKETSTORMid:62490

Trust: 0.1

sources: VULHUB: VHN-33583 // VULMON: CVE-2008-3458 // BID: 27228 // JVNDB: JVNDB-2006-003712 // PACKETSTORM: 62490 // CNNVD: CNNVD-200808-046 // NVD: CVE-2008-3458

REFERENCES

url:http://trac.vtiger.com/cgi-bin/trac.cgi/ticket/2107

Trust: 2.2

url:http://sourceforge.net/project/shownotes.php?release_id=567189

Trust: 1.9

url:http://www.securityfocus.com/bid/27228

Trust: 1.8

url:http://wiki.vtiger.com/index.php/vtiger_crm_5.0.4_-_release_notes

Trust: 1.8

url:http://trac.vtiger.com/cgi-bin/trac.cgi/changeset/11811

Trust: 1.8

url:http://www.osvdb.org/40218

Trust: 1.8

url:http://secunia.com/advisories/28370

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3458

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3458

Trust: 0.8

url:http://www.vtiger.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/advisories/28370/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/14762/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-33583 // VULMON: CVE-2008-3458 // BID: 27228 // JVNDB: JVNDB-2006-003712 // PACKETSTORM: 62490 // CNNVD: CNNVD-200808-046 // NVD: CVE-2008-3458

CREDITS

pieper is credited with discovering this issue.

Trust: 0.9

sources: BID: 27228 // CNNVD: CNNVD-200808-046

SOURCES

db:VULHUBid:VHN-33583
db:VULMONid:CVE-2008-3458
db:BIDid:27228
db:JVNDBid:JVNDB-2006-003712
db:PACKETSTORMid:62490
db:CNNVDid:CNNVD-200808-046
db:NVDid:CVE-2008-3458

LAST UPDATE DATE

2025-04-10T23:03:23.555000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33583date:2017-11-22T00:00:00
db:VULMONid:CVE-2008-3458date:2017-11-22T00:00:00
db:BIDid:27228date:2015-05-07T17:33:00
db:JVNDBid:JVNDB-2006-003712date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200808-046date:2022-03-10T00:00:00
db:NVDid:CVE-2008-3458date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-33583date:2008-08-04T00:00:00
db:VULMONid:CVE-2008-3458date:2008-08-04T00:00:00
db:BIDid:27228date:2008-01-10T00:00:00
db:JVNDBid:JVNDB-2006-003712date:2012-12-20T00:00:00
db:PACKETSTORMid:62490date:2008-01-10T22:33:57
db:CNNVDid:CNNVD-200808-046date:2008-08-04T00:00:00
db:NVDid:CVE-2008-3458date:2008-08-04T19:41:00