IBM Lotus Domino NoBanner information disclosure
|lotus-domino-reveal-information (8160)||High Risk|
Lotus Domino server could allow a remote attacker to gain access to sensitive information, caused by a vulnerability that exists when the "NoBanner" option is enabled. An attacker could send a specially-crafted request for any non-existent file with a .pl extension or send any request that would generate an HTTP 500 error to cause an error message to be returned containing the full installation path or possibly the server version. An attacker could use this information to launch further attacks against the affected system.
Upgrade to the latest version of Lotus Domino (5.0.10 or later), available from the Notes.net Web site. See References.
- BugTraq Mailing List, Sun Mar 03 2002 - 06:01:01 CST: Re: KPMG-2002006: Lotus Domino Physical Path Revealed.
- BugTraq Mailing List, Thu Feb 07 2002 - 11:32:15 CST: Re: KPMG-2002004: Lotus Domino Webserver DOS-device Denial of Service.
- BugTraq Mailing List, Tue Apr 02 2002 - 08:18:06 CST: KPMG-2002006: Lotus Domino Physical Path Revealed.
- BID-4049: Lotus Domino Banner Information Disclosure Vulnerability
- CVE-2002-0245: Lotus Domino server 5.0.8 with NoBanner enabled allows remote attackers to (1) determine the physical path of the server via a request for a nonexistent file with a .pl (Perl) extension, which leaks the pathname in the error message, or (2) make any request that causes an HTTP 500 error, which leaks the server's version name in the HTTP error message.
- OSVDB ID: 15453: IBM Lotus Domino htcgibin.exe HTTP 500 Error Server Version Disclosure
- OSVDB ID: 828: IBM Lotus Domino Nonexistent .pl File Path Disclosure
- IBM Lotus Domino 5.0
- IBM Lotus Domino 5.0.1
- IBM Lotus Domino 5.0.2
- IBM Lotus Domino 5.0.3
- IBM Lotus Domino 5.0.4
- IBM Lotus Domino 5.0.4a
- IBM Lotus Domino 5.0.5
- IBM Lotus Domino 5.0.6
- IBM Lotus Domino 5.0.6a
- IBM Lotus Domino 5.0.7
- IBM Lotus Domino 5.0.7a
- IBM Lotus Domino 5.0.8
- IBM Lotus Domino 5.0.9
Feb 07, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this