Impact
i-doit CMDB version 1.12 contains a flaw that lets an authenticated user download any file present on the server by manipulating the file_manager parameter in index.php. By sending a crafted GET request the attacker can retrieve configuration files, such as config.inc.php, revealing sensitive system data. This represents an Arbitrary File Download weakness (CWE-434).
Affected Systems
The vulnerability affects I-Doit’s CMDB product, specifically version 1.12. No other versions have been reported as impacted.
Risk and Exploitability
The CVSS score of 7.1 places this issue in the high severity range, and the EPSS score indicates a low probability of exploitation under current conditions. It is not listed in CISA’s KEV catalog. Exploitation requires the attacker to be authenticated within the application; after login, an attacker can issue a simple GET request to index.php with the file_manager parameter to obtain arbitrary files. Successful exploitation leads to confidential data exposure and may facilitate further compromise.
OpenCVE Enrichment