Vulnerability Note VU#590487
Lotus Domino vulnerable to directory traversal, aka "Domino Server Directory Transversal Vulnerability"
Lotus Domino web server may allow malformed URL requests to access files outside the document root of a vulnerable system.
A Lotus Domino server running the HTTP task may permit an intruder to read files on file systems or drives that house Lotus Notes databases. By using a specially crafted URL containing ".." and the name of an existing file, an intruder may be able to cause a Domino server to return the contents of the file to the intruder over the HTTP connection. If this file contains sensitive information, an intruder may be able to leverage that information to gain additional access.
Intruders can read files outside the normal web root of a Domino server.
Lotus plans on releasing a new version (R5.0.6a) which addresses this problem as soon as possible. See http://www.lotus.com/security for more details. According to Lotus, the SPR (Software Problem Report) number is KSPR4SPQ5S. When an SPR is fixed, it is posted in the Fix List database on Notes.net. In the meantime, a workaround is possible by using the URL redirection feature of Domino.
Redirect URLs of the form *..* to a harmless location or an error page. See the http://www.lotus.com/security for details or consult your Domino documentation.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Lotus||Affected||06 Jan 2000||10 Jan 2001|
CVSS Metrics (Learn More)
The CERT/CC would like to acknowledge Katherine Spanbauer, Senior Product Manager, Notes and Domino Security Lotus Development Corporation for her assistance, and independent researcher Georgi Guninski who discovered this problem.
This document was written by Jeffrey S Havrilla and Shawn Hernan.
- CVE IDs: Unknown
- Date Public: 05 Jan 2001
- Date First Published: 10 Jan 2001
- Date Last Updated: 10 Jan 2001
- Severity Metric: 21.60
- Document Revision: 19
If you have feedback, comments, or additional information about this vulnerability, please send us email.