Lotus Domino R5 and R6 WebMail - Information Disclosure
ID: CVE-2005-2428
Severity: medium
Author: CasperGN
Tags: cve2005,cve,domino,edb,ibm
Description
Section titled “Description”Lotus Domino R5 and R6 WebMail with ‘Generate HTML for all fields’ enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
YAML Source
Section titled “YAML Source”id: CVE-2005-2428
info: name: Lotus Domino R5 and R6 WebMail - Information Disclosure author: CasperGN severity: medium description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696). impact: | The vulnerability can lead to the disclosure of sensitive information, potentially compromising user privacy and system security. remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files. reference: - http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf - https://www.exploit-db.com/exploits/39495 - https://nvd.nist.gov/vuln/detail/CVE-2005-2428 - http://marc.info/?l=bugtraq&m=112240869130356&w=2 - http://securitytracker.com/id?1014584 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2005-2428 cwe-id: CWE-200 epss-score: 0.01188 epss-percentile: 0.85053 cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: ibm product: lotus_domino tags: cve2005,cve,domino,edb,ibm
http: - method: GET path: - "{{BaseURL}}/names.nsf/People?OpenView"
matchers-condition: and matchers: - type: regex name: domino-username part: body regex: - '(<a href="/names\.nsf/[0-9a-z\/]+\?OpenDocument)'
- type: status status: - 200# digest: 4a0a0047304502204db7cb4cd73bf68475be2974c1a99b836fa6c1ece81d597a27c5029b853819970221008b73212d2c8d95890c30830bbfc5c6fa83bf5b91d1f0fc0af048371991cda24c:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2005/CVE-2005-2428.yaml"