| VID |
22042 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Lotus Domino Server has a directory traversal vulnerability. Lotus Domino is a multiplatform web server which integrates messaging and various interactive web applications. It is possible for a remote user to gain access to any known file residing on the Lotus Domino Server 5.0.6 and previous. A specially crafted HTTP request comprised of '.nsf' and '../' along with the known filename, will display the contents of the particular file with read permissions. Successful exploitation of this vulnerability could enable a remote user to gain access to system files, password files, etc. This could lead to a complete compromise of the host.
* References: http://www.securityfocus.com/bid/2173 http://www.securiteam.com/windowsntfocus/Lotus_Domino_5_0_5_Web_Server_vulnerability_-_reading_files_outside_the_web_root.html |
| Recommendation |
Upgrade to the latest version of Lotus Domino (5.0.6a or upper) from: http://www.notes.net/r5fixlist.nsf
As a workaroud: 1. Open the Administration Client. 2. Select the server you want to administer. 3. From the "Configuration" tab in the "Server" section, select the current server document. Press the "Web" button. Select "Create URL mapping/redirection".
4. In the URL redirection document On the "Basics" tab select: URL ---> Redirection URL On the "Mapping" tab Incoming URL: *..* Redirection URL: [ specify the URL you wish to redirect users to, for example "http://hostname/homepage.nsf" "http://hostname/message.html" ]
Note: the URL specified must be an external redirection, not an internal redirection. Therefore, http://myserver/message.html works, but /message.html does not.
5. Save the document. 6. Restart the HTTP task. |
| Related URL |
CVE-2001-0009 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|