Enhancement: cves/2005/CVE-2005-2428.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-02-02 13:15:44 -05:00
parent 8c22a7f11a
commit fb84327f3c
1 changed files with 3 additions and 1 deletions

View File

@ -5,7 +5,7 @@ info:
severity: medium
tags: cve,cve2005,domino
description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
remediation: ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
reference:
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
- https://www.exploit-db.com/exploits/39495
@ -31,3 +31,5 @@ requests:
part: body
# Enhanced by cs on 2022/02/02
# Enhanced by mp on 2022/02/02