| VID |
21113 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
A vulnerability in the configuration of many Domino-based applications could reveal sensitive information to remote attackers. These misconfigurations could allow remote users to gain unrestricted access to Domino database views and under some circumstances the ability to search for specific information.
For examples, To open the Domino Configuration database add 'domcfg.nsf/?Open' to the end of the above URL, so you have:
http://www.target.com/domcfg.nsf/?open
Now, in a correctly secured domcfg.nsf you would be prompted for a password at this point (or, in some cases, the domcfg.nsf file has not even been created and won't be there). Anyway, many sites (due to the details listed above) do NOT have their domcfg.nsf ACL setup correctly and at this point a web user sees a screen showing different views they can pick from (URL Redirection, Directory Mappings, etc.). |
| Recommendation |
Domino sites should disallow anonymous access for at least these databases: names.nsf, catalog.nsf, log.nsf, domlog.nsf, and domcfg.nsf. |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
1369 (ISS) |
|