Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:DOMINO:NSF-DIR-TRAVERSAL

Severity

Low

Recommended

No

Category

HTTP

Keywords

Lotus Domino .nsf Directory Traversal

Release Date

2003/04/22

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Lotus Domino .nsf Directory Traversal


This signature detects directory traversal attempts against Lotus Domino Web Servers. Versions 5.0.6 and earlier are vulnerable. Attackers can send a malicious URL that contains a blank .nsf extension and uses a relative path to the server files that attacker wants to access.

Extended Description

It is possible for a remote user to gain access to any known file residing on the Lotus Domino Server 5.0.6 and previous. A specially crafted HTTP request comprised of '.nsf' and '../' along with the known filename, will display the contents of the particular file with read permissions. Successful exploitation of this vulnerability could enable a remote user to gain access to systems files, password files, etc. This could lead to a complete compromise of the host.

Affected Products

  • Lotus Domino 5.0.2
  • Lotus Domino 5.0.3
  • Lotus Domino 5.0.5
  • Lotus Domino 5.0.6

References

  • BugTraq: 2173
  • CVE: CVE-2001-0009
  • URL: http://www.securiteam.com/securitynews/5XP0G154UQ.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out