search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Lotus Notes does not adequately secure databases thereby permitting arbitrary user to extract file attachments via NSFDbReadObject function call

Vulnerability Note VU#657899

Original Release Date: 2002-04-01 | Last Revised: 2002-05-03

Overview

Lotus Domino Servers 5.x, 4.6x, and 4.5x allow users to associate objects with documents in a database. While these objects appear to be a part of the document, they are actually stored as separate files. A vulnerability exist by which an intruder could view these objects regardless of the permissions set on the document to which they belong.

Description

Lotus Notes allows users to associate objects with documents in a database. While these objects appear to be a part of the document, they are actually stored as separate files. Access to the documents and objects are controlled by the database ACL, however, the use of the Reader and Author lists can further restrict access to individual documents . The Reader and Author lists modify access only to the documents themselves and not to associated objects. Therefore an intruder who does not have access to a document, because of permissions set by the Reader and Author lists, can still access the objects associated with that document. Using Notes API calls an intruder can directly open the desired object if the Notes unique document ID of that object is known. The intruder must be able to access the target database in order to exploit this vulnerability. Lotus has released a Tech Note to address this problem.

Impact

An intruder can view objects that they do not have permission to view.

Solution

Upgrade to Notes/Domino R5.0.10.

A workaround is to use document encryption to protect rich text fields that contain attachments. Documents can be encrypted using either public encryption keys (for example, the keys of the users listed in the reader names field) or using secret encryption keys.

Vendor Information

657899
 
Affected   Unknown   Unaffected

Lotus

Notified:  September 18, 2001 Updated:  April 08, 2002

Status

  Vulnerable

Vendor Statement

R5.0.10 is now available and the technote has been updated

http://www-1.ibm.com/support/manager.wss?rs=1&rt=0&org=sims&doc=CCA46CF459BA6E4A85256AE3007C92C1

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

This vulnerability was discovered by Joshua Jore.

This document was written by Jason Rafail and is based on the Tech Note released by Lotus to address this issue

Other Information

CVE IDs: CVE-2002-0037
Severity Metric: 1.41
Date Public: 2001-09-17
Date First Published: 2002-04-01
Date Last Updated: 2002-05-03 21:03 UTC
Document Revision: 27

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.