what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

domino.r4.txt

domino.r4.txt
Posted Jul 3, 2002
Authored by Andrew T | Site Digisec.org

Lotus Domino Web Server R4 on AIX (other platforms not tested) allows remote users to download files in the web root regardless of ECL's or permissions.

tags | exploit, remote, web, root
systems | aix
SHA-256 | e8fa238c58346a1f2b8e39af9e91b98c924e12b393308944758bac278c369ecd

domino.r4.txt

Change Mirror Download
Lotus Domino R4 Web Server -- File Retreival Vulnerability


Digisec.org Security Advisory



Systems affected:



Lotus Domino R4 (Versions 4.x) AIX - have not tested other
versions/platforms



Risk: High

Date: July 2, 2002



Legal Notice:



This advisory is Copyright (c) 2002 Digisec.org



This advisory may be distributed unmodified, however, you may not modify
and distribute (in parts or in it's entirety) without express written
permission.



Disclaimer:



Use this information at your own risk. Digisec.org is not liable for
any damages caused by direct or indirect use of the information or
functionality provided by this advisory. Digisec.org bears no
responsibility for content or misuse of this advisory or any derivatives
thereof.



Description:



Lotus Domino Web Server under AIX (have not tested other versions)
allows downloading of files in the web root directory (rather than
referring to the ECLs within the database or the permissions on the file
itself). This does not work on the standard web scripts included in
Domino such as admin4.nsf, names.nsf, domcfg.nsf, etc. However, if
there are other files or custom-made .nsf databases in the server's web
root directory, they may be downloaded by appending a "?" at the end of
the file name.



Our understanding of this problem is based on the way that Lotus handles
documents in the web root directory. When a request is made to a file,
the addition of the "?" on the end of the file name acts as a wildcard.
The server doesn't know how to handle this character and instead just
delivers the entire file rather than trying to parse the file through
the web handler. This was tested with other various file types (.tar,
.htm, .zip, etc.) all with success.



Exploit Information:



http://dominoserver/nameoffile.ext? will get the file "nameoffile.ext".





Vendor status:

Lotus was notified about the issue. They noted that this issue had
never been reported and suggested a workaround that appears to correct
the issue. Their suggestion was to create a separate directory for the
web site files (don't put them in the web root created during
installation). Also, the permissions on these files should be
appropriately applied. This vulnerability only appears to work on files
within the web root directory not in other folders. This vulnerability
is not an issue in R5 (which was tested by Lotus).



Acknowledgements:



Thanks to the following for your support and insight: Lotus,
packetphobia, rabidpacketmonky and j0hnn135.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close