Lotus Domino Server Multiple Information Disclosure Vulnerabilities

low Nessus Network Monitor Plugin ID 3114

Synopsis

The remote host may give an attacker information useful for future attacks.

Description

The remote host is running a version of Lotus Domino Server that is prone to several information disclosure vulnerabilities. Specifically, users' password hashes and other data are included in hidden fields in the public address book 'names.nsf' that is readable by default by all users. Moreover, Domino does not use a 'salt' to compute password hashes, which makes it easier to crack passwords.

Solution

Upgrade to version 6.5.5, 6.0.6 or higher.

See Also

http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf

Plugin Details

Severity: Low

ID: 3114

Family: Web Servers

Published: 7/26/2005

Updated: 3/6/2019

Nessus ID: 19309

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Low

Base Score: 2.7

Temporal Score: 2.6

Vector: CVSS2#AV:A/AC:L/Au:S/C:P/I:N/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.5

Temporal Score: 3.4

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:W/RC:X

Vulnerability Information

CPE: cpe:/a:ibm:lotus_domino

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2005-2428

BID: 14388, 14389