Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Web Servers >> Authentication bypassing in Lotus Domino


Vulnerability Assessment Details

Authentication bypassing in Lotus Domino

Vulnerability Assessment Summary
Checks if Lotus Domino databases can be accessed by by-passing the required authentication

Detailed Explanation for this Vulnerability Assessment

By creating a specially crafted url, the authentication mechanism of
Domino database can be circumvented. These urls should look like:

http://host.com/.ntf.nsf/ in which has a
certain length.

Solution: Upgrade to the latest version of Domino.
Network Security Threat Level: High

Networks Security ID: 4022

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Davy Van De Moere

Cables, Connectors

MagicJack (USB) PC to Phone Jack VOIP- As Seen On TV BRAND NEW & Factory sealed
$24.0
MagicJack (USB) PC to Phone Jack VOIP- As Seen On TV BRAND NEW & Factory sealed pictureVONAGE WIRED ROUTER VoIP PHONE ADAPTER - MODEL VDV23-VD
$2.09
VONAGE WIRED ROUTER VoIP PHONE ADAPTER - MODEL VDV23-VD  pictureViking Electronics Voip Speaker Phone E-10-IP
$323.99
Viking Electronics Voip Speaker Phone E-10-IP pictureOBi202 VoIP Phone Adapter w Router, 2-Phone Ports FREE PRIORITY SHIPPING
$85.0
OBi202 VoIP Phone Adapter w Router, 2-Phone Ports  FREE PRIORITY SHIPPING picture


Discussions

No Discussions have been posted on this vulnerability.