exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

domino.r4.txt

domino.r4.txt
Posted Jul 3, 2002
Authored by Andrew T | Site Digisec.org

Lotus Domino Web Server R4 on AIX (other platforms not tested) allows remote users to download files in the web root regardless of ECL's or permissions.

tags | exploit, remote, web, root
systems | aix
SHA-256 | e8fa238c58346a1f2b8e39af9e91b98c924e12b393308944758bac278c369ecd

domino.r4.txt

Change Mirror Download
Lotus Domino R4 Web Server -- File Retreival Vulnerability


Digisec.org Security Advisory



Systems affected:



Lotus Domino R4 (Versions 4.x) AIX - have not tested other
versions/platforms



Risk: High

Date: July 2, 2002



Legal Notice:



This advisory is Copyright (c) 2002 Digisec.org



This advisory may be distributed unmodified, however, you may not modify
and distribute (in parts or in it's entirety) without express written
permission.



Disclaimer:



Use this information at your own risk. Digisec.org is not liable for
any damages caused by direct or indirect use of the information or
functionality provided by this advisory. Digisec.org bears no
responsibility for content or misuse of this advisory or any derivatives
thereof.



Description:



Lotus Domino Web Server under AIX (have not tested other versions)
allows downloading of files in the web root directory (rather than
referring to the ECLs within the database or the permissions on the file
itself). This does not work on the standard web scripts included in
Domino such as admin4.nsf, names.nsf, domcfg.nsf, etc. However, if
there are other files or custom-made .nsf databases in the server's web
root directory, they may be downloaded by appending a "?" at the end of
the file name.



Our understanding of this problem is based on the way that Lotus handles
documents in the web root directory. When a request is made to a file,
the addition of the "?" on the end of the file name acts as a wildcard.
The server doesn't know how to handle this character and instead just
delivers the entire file rather than trying to parse the file through
the web handler. This was tested with other various file types (.tar,
.htm, .zip, etc.) all with success.



Exploit Information:



http://dominoserver/nameoffile.ext? will get the file "nameoffile.ext".





Vendor status:

Lotus was notified about the issue. They noted that this issue had
never been reported and suggested a workaround that appears to correct
the issue. Their suggestion was to create a separate directory for the
web site files (don't put them in the web root created during
installation). Also, the permissions on these files should be
appropriately applied. This vulnerability only appears to work on files
within the web root directory not in other folders. This vulnerability
is not an issue in R5 (which was tested by Lotus).



Acknowledgements:



Thanks to the following for your support and insight: Lotus,
packetphobia, rabidpacketmonky and j0hnn135.

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close