2021-01-02 05:02:50 +00:00
id : CVE-2005-2428
2022-04-22 10:38:41 +00:00
2020-09-09 08:11:50 +00:00
info :
2022-05-09 16:12:52 +00:00
name : Lotus Domino R5 and R6 WebMail - Information Disclosure
2020-09-09 08:11:50 +00:00
author : CasperGN
severity : medium
2022-05-17 09:18:12 +00:00
description : Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
2023-09-27 15:51:13 +00:00
impact : |
The vulnerability can lead to the disclosure of sensitive information, potentially compromising user privacy and system security.
2023-09-06 13:22:34 +00:00
remediation : Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
2021-08-18 11:37:49 +00:00
reference :
2021-04-22 08:59:05 +00:00
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
- https://www.exploit-db.com/exploits/39495
2022-05-09 16:12:52 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2005-2428
2023-07-11 19:49:27 +00:00
- http://marc.info/?l=bugtraq&m=112240869130356&w=2
- http://securitytracker.com/id?1014584
2022-02-02 18:08:10 +00:00
classification :
2023-07-11 19:49:27 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score : 5
2022-02-02 18:08:10 +00:00
cve-id : CVE-2005-2428
cwe-id : CWE-200
2023-07-11 19:49:27 +00:00
epss-score : 0.01188
2024-06-07 10:04:29 +00:00
epss-percentile : 0.85053
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : ibm
product : lotus_domino
2024-01-14 09:21:50 +00:00
tags : cve2005,cve,domino,edb,ibm
2020-09-09 08:11:50 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-09-09 08:11:50 +00:00
- method : GET
path :
- "{{BaseURL}}/names.nsf/People?OpenView"
2023-07-11 19:49:27 +00:00
2020-09-09 18:44:26 +00:00
matchers-condition : and
2020-09-09 08:38:32 +00:00
matchers :
2020-09-09 17:08:23 +00:00
- type : regex
name : domino-username
2023-07-11 19:49:27 +00:00
part : body
2020-09-09 17:08:23 +00:00
regex :
2022-02-04 20:22:52 +00:00
- '(<a href="/names\.nsf/[0-9a-z\/]+\?OpenDocument)'
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2024-01-30 06:46:18 +00:00
# digest: 490a004630440220023561509073a250a9589a0ef1039640f1a8e364c5893b9ebbfa32fab389dbef022051dbb9e24a672b7ca924059689d605544097318aa9d433aafdd646a6d4887282:922c64590222798bb761d5b6d8e72950