HTTP: Lotus Domino .nsf Password Bypass

This signature detects attempts to exploit a known vulnerability in Lotus Domino Web Server 5.0.8. Attackers can send a malformed URL to the daemon to bypass password protection on internal databases and obtain sensitive information that is normally restricted to administrator access.

Extended Description

Lotus Domino Server is an application framework for web based collaborative software. It runs on multiple platforms including Windows and Unix. Database files (.nsf) may be protected with a password under Domino. If a remote request for the file is submitted with a maliciously constructed filename of the correct length, the authentication process may be bypassed. There have been multiple reports that this is a known issue, and only allows the remote user to access template (.ntf) files. There have been reports that this issue is fixed in Domino 5.0.9.

Affected Products

Lotus domino,Lotus domino

Short Name
HTTP:DOMINO:NSF-PASSWORD-BYPASS
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
.nsf Bypass CVE-2001-1567 Domino Lotus Password bid:4022
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Lotus

CVSS Score

5.0

Found a potential security threat?