IBM Lotus Domino HTML Hidden Field Encrypted Password Disclosure

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by multiple information disclosure
vulnerabilities.

Description :

The remote host is running a version of Lotus Domino Server that is
prone to several information disclosure vulnerabilities.
Specifically, users' password hashes and other data are included in
hidden fields in the public address book 'names.nsf' readable by
default by all users. Moreover, Domino does not use a 'salt' to
compute password hashes, which makes it easier to crack passwords.

See also :

http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf

Solution :

Upgrade to Lotus Domino Server version 6.0.6 / 6.5.5 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 19309 (domino_http_info_disclosure.nasl)

Bugtraq ID: 14388
14389

CVE ID: CVE-2005-2428

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial