发布时间 :2001-12-31 00:00:00
修订时间 :2016-10-17 22:15:22

[原文]Lotus Domino server 5.0.9a and earlier allows remote attackers to bypass security restrictions and view Notes database files and possibly sensitive Notes template files (.ntf) via an HTTP request with a large number of "+" characters before the .nsf file extension, which are converted to spaces by Domino.

[CNNVD]Lotus Domino远程绕过口令认证漏洞(CNNVD-200112-225)

        Lotus Domino Server是一个基于Web进行协同工作的软件包,它运行于包括Windows和Unix的多种系统之下。
        Domino Server对HTTP请求的处理上存在漏洞,远程攻击者可能利用此漏洞绕过对数据库文件的口令保护。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:ibm:lotus_domino:5.0.9IBM Lotus Domino 5.0.9
cpe:/a:ibm:lotus_domino:5.0.8IBM Lotus Domino 5.0.8
cpe:/a:ibm:lotus_domino:5.0IBM Lotus Domino 5.0
cpe:/a:ibm:lotus_domino:5.0.7aIBM Lotus Domino 5.0.7a
cpe:/a:ibm:lotus_domino:5.0.1IBM Lotus Domino 5.0.1
cpe:/a:ibm:lotus_domino:5.0.2IBM Lotus Domino 5.0.2
cpe:/a:ibm:lotus_domino:5.0.5IBM Lotus Domino 5.0.5
cpe:/a:ibm:lotus_domino:5.0.6IBM Lotus Domino 5.0.6
cpe:/a:ibm:lotus_domino:5.0.3IBM Lotus Domino 5.0.3
cpe:/a:ibm:lotus_domino_server:5.0.9aIBM Lotus Domino Server 5.0.9a

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20020203 Lotus Domino password bypass
(UNKNOWN)  BUGTRAQ  20020204 Re: Lotus Domino password bypass
(UNKNOWN)  BUGTRAQ  20020204 Lotus Domino password bypass
(UNKNOWN)  XF  lotus-domino-auth-bypass(8072)
(UNKNOWN)  BID  4022

- 漏洞信息

Lotus Domino远程绕过口令认证漏洞
中危 边界条件错误
2001-12-31 00:00:00 2005-10-20 00:00:00
        Lotus Domino Server是一个基于Web进行协同工作的软件包,它运行于包括Windows和Unix的多种系统之下。
        Domino Server对HTTP请求的处理上存在漏洞,远程攻击者可能利用此漏洞绕过对数据库文件的口令保护。

- 公告与补丁

        * 对Web Adminstrator Templete文件,例如webadmin.ntf,设置访问控制规则,限制匿名访问这些文件。

- 漏洞信息

IBM Lotus Domino Crafted .nsf Request Authentication Bypass

- 漏洞描述

Lotus Domino HTTP Service contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when a request for a protected datbase us submitted via HTTP with a malformed URL. This flaw may lead to a loss of confidentiality.

- 时间线

2002-02-03 Unknow
2002-02-03 Unknow

- 解决方案

Upgrade to version 5.0.9 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): See the external reference at nextgenss for solutions.

- 相关参考

- 漏洞作者

Unknown or Incomplete