Summary
This host is running Lotus Domino Server and is prone to multiple information disclosure vulnerabilities.
Impact
Successful exploitation will allow attacker to access web server configuration information.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaws are due to the multiple config files (names.nsf, admin4.nsf, catalog.nsf, events4.nsf) are accessible without authentication, there is a leakage of information about web server configuration.
Affected
IBM Lotus Domino 8.5.3, 8.5.4, 9.0 and previous versions.
Detection
Send the direct HTTP request to restricted config files and check it is possible to read the configuration file content or not.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:P/I:P/A:N
Related Vulnerabilities
- Ampache Reflected Cross Site Scripting Vulnerability
- appRain CMF 'uploadify.php' Remote Arbitrary File Upload Vulnerability
- Apache Continuum Cross Site Scripting Vulnerability
- Apache Struts2 showcase namespace XSS Vulnerability
- APC PowerChute Network Shutdown 'security/applet' Cross Site Scripting Vulnerability