Vulnerability CVE-2005-2428


Published: 2005-08-03   Modified: 2012-02-12

Description:
Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
IBM Lotus Domino <= R8 Password Hash Extraction Exploit
Jonathan Broche
26.02.2016

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
IBM -> Lotus domino 

 References:
http://marc.info/?l=bugtraq&m=112240869130356&w=2
http://securitytracker.com/id?1014584
http://www-1.ibm.com/support/docview.wss?uid=swg21212934
http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
http://www.securiteam.com/securitynews/5FP0E15GLQ.html
http://www.securityfocus.com/bid/14389
https://exchange.xforce.ibmcloud.com/vulnerabilities/21556
https://www.exploit-db.com/exploits/39495/

Copyright 2024, cxsecurity.com

 

Back to Top