id: CVE-2005-2428 info: name: Lotus Domino R5 and R6 WebMail - Information Disclosure author: CasperGN severity: medium description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696). remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files. reference: - http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf - https://www.exploit-db.com/exploits/39495 - https://nvd.nist.gov/vuln/detail/CVE-2005-2428 - http://marc.info/?l=bugtraq&m=112240869130356&w=2 - http://securitytracker.com/id?1014584 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2005-2428 cwe-id: CWE-200 epss-score: 0.01188 epss-percentile: 0.83571 cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: ibm product: lotus_domino tags: domino,edb,cve,cve2005 http: - method: GET path: - "{{BaseURL}}/names.nsf/People?OpenView" matchers-condition: and matchers: - type: regex name: domino-username part: body regex: - '(