IBM Lotus Domino HTML Hidden Field Encrypted Password Disclosure

medium Nessus Plugin ID 19309

Synopsis

The remote web server is affected by multiple information disclosure vulnerabilities.

Description

The remote host is running a version of Lotus Domino Server that is prone to several information disclosure vulnerabilities. Specifically, users' password hashes and other data are included in hidden fields in the public address book 'names.nsf' readable by default by all users. Moreover, Domino does not use a 'salt' to compute password hashes, which makes it easier to crack passwords.

Solution

Upgrade to Lotus Domino Server version 6.0.6 / 6.5.5 or later.

See Also

http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf

Plugin Details

Severity: Medium

ID: 19309

File Name: domino_http_info_disclosure.nasl

Version: 1.18

Type: remote

Family: Web Servers

Published: 7/27/2005

Updated: 7/10/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:ibm:lotus_domino

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/28/2005

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2005-2428

BID: 14388, 14389