IBM Lotus Domino HTML Hidden Field Encrypted Password Disclosure

Medium Nessus Plugin ID 19309


The remote web server is affected by multiple information disclosure vulnerabilities.


The remote host is running a version of Lotus Domino Server that is prone to several information disclosure vulnerabilities. Specifically, users' password hashes and other data are included in hidden fields in the public address book 'names.nsf' readable by default by all users. Moreover, Domino does not use a 'salt' to compute password hashes, which makes it easier to crack passwords.


Upgrade to Lotus Domino Server version 6.0.6 / 6.5.5 or later.

See Also

Plugin Details

Severity: Medium

ID: 19309

File Name: domino_http_info_disclosure.nasl

Version: $Revision: 1.17 $

Type: remote

Family: Web Servers

Published: 2005/07/27

Modified: 2016/05/05

Dependencies: 10107

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:ibm:lotus_domino

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2005/07/28

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2005-2428

BID: 14388, 14389

OSVDB: 18462