发布时间 :1999-12-21 00:00:00
修订时间 :2008-09-10 15:02:19

[原文]Lotus Domino HTTP server does not properly disable anonymous access for the cgi-bin directory.

[CNNVD]Lotus Notes Domino的Web服务器的CGI漏洞(CNNVD-199912-068)

        Lotus Domino HTTP服务器中存在漏洞,该漏洞使得服务器不正确的禁用匿名访问cgi - bin目录。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

Lotus Notes Domino的Web服务器的CGI漏洞
中危 未知
1999-12-21 00:00:00 2005-05-02 00:00:00
        Lotus Domino HTTP服务器中存在漏洞,该漏洞使得服务器不正确的禁用匿名访问cgi - bin目录。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 漏洞信息

IBM Lotus Domino HTTP Anonymous CGI Access

- 漏洞描述

Lotus Domino HTTP Service contains a flaw that may allow a malicious user to gain inappropriate access to the cgi-bin directory. The issue is triggered when anonymous access to the cgi-bin directory is disabled. It is possible that the flaw may allow anonymous access to cgi-bin even when it has been turned off resulting in a loss of confidentiality.

- 时间线

1999-12-21 1999-12-11
Unknow Unknow

- 解决方案

Upgrade to version 5.0 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): Redirect CGI handling as specified in the Lotus BUGTRAQ post: * If the customer does not require the use of any CGI's, then the entire /cgi-bin directory can be redirected to another URL (a Notes database, or html file). If any "/cgi-bin" requests are made, they will be directed to this URL and are not processed as CGI. * If the customer does require the use of CGI's the following setup will be required: 1) In the HTTP section of the Server Document, change the "CGI URL path" field to a different URL path. This does not require a change for the "CGI directory" field, such that the location on the hard drive for CGI's will remain the same. Only the URL which invokes CGI's will be altered. Example: The default CGI URL path is "/cgi-bin"; change this to "/scripts/cgi-bin". Now, whenever a /cgi-bin request is made, it is recognized as a URL instead of a CGI. 2) Create a URL Redirect document in the DOMCFG.NSF for each specific CGI that resides on the server. Specify the incoming URL path as "/cgi-bin", and the redirection URL as "/scripts/cgi-bin".

- 相关参考

- 漏洞作者

Unknown or Incomplete