Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Web Servers >> Authentication bypassing in Lotus Domino


Vulnerability Assessment Details

Authentication bypassing in Lotus Domino

Vulnerability Assessment Summary
Checks if Lotus Domino databases can be accessed by by-passing the required authentication

Detailed Explanation for this Vulnerability Assessment

By creating a specially crafted url, the authentication mechanism of
Domino database can be circumvented. These urls should look like:

http://host.com/.ntf.nsf/ in which has a
certain length.

Solution: Upgrade to the latest version of Domino.
Network Security Threat Level: High

Networks Security ID: 4022

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Davy Van De Moere

Cables, Connectors

ASUS P4V8X-MX , Socket 478 , Intel Motherboard w/ 2.8GHZ CPU
$40.0
ASUS P4V8X-MX , Socket 478 , Intel Motherboard w/ 2.8GHZ CPU pictureOEM Intel Core i3-2370M 2.4GHz Socket G2 (rPGA988B) Laptop Processor CPU SR0DP
$11.99
OEM Intel Core i3-2370M 2.4GHz Socket G2 (rPGA988B) Laptop Processor CPU SR0DP pictureIntel Core 2 Quad Q9450 2.66GHz Quad-Core CPU Desktop Processor SLAWR
$18.99
Intel Core 2 Quad Q9450 2.66GHz Quad-Core CPU Desktop Processor SLAWR pictureThermaltake Slim X3 CPU Cooler Store Stock Never Used
$14.99
Thermaltake Slim X3 CPU Cooler Store Stock Never Used picture


Discussions

No Discussions have been posted on this vulnerability.