| Vulnerability Name: | CVE-2005-2428 (CCN-21556) | ||||||||
| Assigned: | 2005-07-28 | ||||||||
| Published: | 2005-07-28 | ||||||||
| Updated: | 2017-09-10 | ||||||||
| Summary: | Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696. | ||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||
| References: | Source: CCN Type: BugTraq Mailing List, Tue Jul 26 2005 - 13:36:29 CDT Default Configuration Information Disclosure in Lotus Domino Source: MITRE Type: CNA CVE-2005-2428 Source: MITRE Type: CNA CVE-2005-2696 Source: BUGTRAQ Type: UNKNOWN 20050726 CYBSEC - Security Advisory: Default Configuration Information Source: CCN Type: SA16231 Lotus Domino Webmail Information Disclosure Security Issue Source: SECUNIA Type: Vendor Advisory 16231 Source: CCN Type: SECTRACK ID: 1014584 IBM Lotus Domino Discloses Hashed Passwords and Other Information to Remote Authenticated Users Source: SECTRACK Type: UNKNOWN 1014584 Source: CCN Type: IBM - CYYSEC Advisory Default Configuration Information Disclosure in Lotus Domino Source: CONFIRM Type: Vendor Advisory http://www-1.ibm.com/support/docview.wss?uid=swg21212934 Source: CCN Type: CYBSEC Security Advisory Default Configuration Information Disclosure in Lotus Domino Source: MISC Type: Vendor Advisory http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf Source: CCN Type: IBM Web site IBM Lotus Domino Source: OSVDB Type: UNKNOWN 18462 Source: CCN Type: OSVDB ID: 18462 IBM Lotus Domino HTML Hidden Field Encrypted Password Disclosure Source: CCN Type: OSVDB ID: 19807 IBM Lotus Notes Client Administration Tab Password Hash Disclosure Source: CCN Type: OSVDB ID: 19808 IBM Lotus Notes Address Book (NAB) Document Properties Hashed Password Disclosure Source: CCN Type: OSVDB ID: 19809 IBM Lotus Notes Domino LDAP Server Direct Query Hashed Password Disclosure Source: CCN Type: OSVDB ID: 35764 IBM Lotus Domino / WebMail names.nsf User HTTPPassword Hashes Disclosure Source: CCN Type: OSVDB ID: 38993 IBM Lotus Notes notes.ini Debug Variables Remote Cleartext Password Disclosure Source: MISC Type: UNKNOWN http://www.securiteam.com/securitynews/5FP0E15GLQ.html Source: CCN Type: BID-14388 IBM Lotus Domino WebMail Information Disclosure Vulnerability Source: BID Type: UNKNOWN 14389 Source: CCN Type: BID-14389 IBM Lotus Domino Password Encryption Weakness Source: XF Type: UNKNOWN lotus-domino-names-obtain-information(21556) Source: XF Type: UNKNOWN lotus-domino-names-obtain-information(21556) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [02-25-2016] Source: EXPLOIT-DB Type: UNKNOWN 39495 | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||