Short Name |
HTTP:DOMINO:NSF-PASSWORD-BYPASS |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
Lotus Domino .nsf Password Bypass |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Lotus Domino Web Server 5.0.8. Attackers can send a malformed URL to the daemon to bypass password protection on internal databases and obtain sensitive information that is normally restricted to administrator access.
Lotus Domino Server is an application framework for web based collaborative software. It runs on multiple platforms including Windows and Unix. Database files (.nsf) may be protected with a password under Domino. If a remote request for the file is submitted with a maliciously constructed filename of the correct length, the authentication process may be bypassed. There have been multiple reports that this is a known issue, and only allows the remote user to access template (.ntf) files. There have been reports that this issue is fixed in Domino 5.0.9.