Lucene search

K
nessusThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.DOMINO_HTTP_INFO_DISCLOSURE.NASL
HistoryJul 27, 2005 - 12:00 a.m.

IBM Lotus Domino HTML Hidden Field Encrypted Password Disclosure

2005-07-2700:00:00
This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
www.tenable.com
115

The remote host is running a version of Lotus Domino Server that is prone to several information disclosure vulnerabilities. Specifically, users’ password hashes and other data are included in hidden fields in the public address book ‘names.nsf’ readable by default by all users. Moreover, Domino does not use a ‘salt’ to compute password hashes, which makes it easier to crack passwords.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(19309);
  script_version("1.18");
  script_cvs_date("Date: 2018/07/10 14:27:33");

  script_cve_id("CVE-2005-2428");
  script_bugtraq_id(14388, 14389);

  script_name(english:"IBM Lotus Domino HTML Hidden Field Encrypted Password Disclosure");
  script_summary(english:"Checks for information disclosure vulnerabilities in Lotus Domino Server");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by multiple information disclosure
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote host is running a version of Lotus Domino Server that is
prone to several information disclosure vulnerabilities. 
Specifically, users' password hashes and other data are included in
hidden fields in the public address book 'names.nsf' readable by
default by all users.  Moreover, Domino does not use a 'salt' to
compute password hashes, which makes it easier to crack passwords.");
  script_set_attribute(attribute:"see_also", value:"http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Lotus Domino Server version 6.0.6 / 6.5.5 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
  script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');
  script_set_attribute(attribute:"plugin_publication_date", value: "2005/07/27");
  script_set_attribute(attribute:"vuln_publication_date", value: "2005/07/28");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:lotus_domino");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

# Check the version number in the banner.
banner = get_http_banner(port:port);
if (
  banner &&
  egrep(string:banner, pattern:"^Server: +Lotus-Domino/([0-5]\.|6\.(0\.[0-5]|[1-4]\.|5\.[0-4]))")
) {
  security_warning(port);
}
VendorProductVersionCPE
ibmlotus_dominocpe:/a:ibm:lotus_domino