IBM Lotus Domino 6/7 HTTP webadmin.nsf Directory Traversal Vulnerability

2004-03-17T00:00:00
ID EDB-ID:23836
Type exploitdb
Reporter dr_insane
Modified 2004-03-17T00:00:00

Description

IBM Lotus Domino 6/7 HTTP webadmin.nsf Directory Traversal Vulnerability. CVE-2004-2311. Remote exploit for windows platform

                                        
                                            source: http://www.securityfocus.com/bid/9900/info

It has been reported that Lotus Domino may be prone to a directory traversal vulnerability that may allow a remote attacker to access information outside the server root directory. The issue reportedly exists in the server's administrative interface accessed via 'webadmin.nsf'. The vulnerability may be exploited by a remote attacker by traversing outside the server root directory by using '../' directory traversal character sequences. Successful exploitation of this vulnerability may allow a remote attacker to gain access to sensitive information and/or modify the underlying file system.

IBM Lotus Domino server 6.5.1 has been reported to be prone to this issue, however, it is possible that other versions are affected as well.

1)Go to http://www.example.com/webadmin.nsf
2)Go to "Files" tab
3)From the "Tools" menu select to create a "new" folder
4)As the name of the new folder enter "/../../../../../../pr00f"

or

"/../../../../windows/win.ini"