HTTP: Lotus Domino .nsf Directory Traversal

This signature detects directory traversal attempts against Lotus Domino Web Servers. Versions 5.0.6 and earlier are vulnerable. Attackers can send a malicious URL that contains a blank .nsf extension and uses a relative path to the server files that attacker wants to access.

Extended Description

It is possible for a remote user to gain access to any known file residing on the Lotus Domino Server 5.0.6 and previous. A specially crafted HTTP request comprised of '.nsf' and '../' along with the known filename, will display the contents of the particular file with read permissions. Successful exploitation of this vulnerability could enable a remote user to gain access to systems files, password files, etc. This could lead to a complete compromise of the host.

Affected Products

Lotus domino,Lotus domino

Short Name
HTTP:DOMINO:NSF-DIR-TRAVERSAL
Severity
Warning
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
.nsf CVE-2001-0009 Directory Domino Lotus Traversal bid:2173
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Lotus

CVSS Score

5.0

Found a potential security threat?