Korean
<< Back
VID 22042
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Lotus Domino Server has a directory traversal vulnerability.
Lotus Domino is a multiplatform web server which integrates messaging and various interactive web applications. It is possible for a remote user to gain access to any known file residing on the Lotus Domino Server 5.0.6 and previous. A specially crafted HTTP request comprised of '.nsf' and '../' along with the known filename, will display the contents of the particular file with read permissions. Successful exploitation of this vulnerability could enable a remote user to gain access to system files, password files, etc. This could lead to a complete compromise of the host.

* References:
http://www.securityfocus.com/bid/2173
http://www.securiteam.com/windowsntfocus/Lotus_Domino_5_0_5_Web_Server_vulnerability_-_reading_files_outside_the_web_root.html
Recommendation Upgrade to the latest version of Lotus Domino (5.0.6a or upper) from:
http://www.notes.net/r5fixlist.nsf

As a workaroud:
1. Open the Administration Client.
2. Select the server you want to administer.
3. From the "Configuration" tab in the "Server" section, select the current server document.
Press the "Web" button.
Select "Create URL mapping/redirection".

4. In the URL redirection document
On the "Basics" tab select: URL ---> Redirection URL
On the "Mapping" tab
Incoming URL: *..*
Redirection URL: [ specify the URL you wish to redirect users to, for example
"http://hostname/homepage.nsf"
"http://hostname/message.html" ]

Note: the URL specified must be an external redirection, not an internal redirection. Therefore, http://myserver/message.html works, but /message.html does not.

5. Save the document.
6. Restart the HTTP task.
Related URL CVE-2001-0009 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)