14 lines
No EOL
1,011 B
Text
14 lines
No EOL
1,011 B
Text
source: https://www.securityfocus.com/bid/9900/info
|
|
|
|
It has been reported that Lotus Domino may be prone to a directory traversal vulnerability that may allow a remote attacker to access information outside the server root directory. The issue reportedly exists in the server's administrative interface accessed via 'webadmin.nsf'. The vulnerability may be exploited by a remote attacker by traversing outside the server root directory by using '../' directory traversal character sequences. Successful exploitation of this vulnerability may allow a remote attacker to gain access to sensitive information and/or modify the underlying file system.
|
|
|
|
IBM Lotus Domino server 6.5.1 has been reported to be prone to this issue, however, it is possible that other versions are affected as well.
|
|
|
|
1)Go to http://www.example.com/webadmin.nsf
|
|
2)Go to "Files" tab
|
|
3)From the "Tools" menu select to create a "new" folder
|
|
4)As the name of the new folder enter "/../../../../../../pr00f"
|
|
|
|
or
|
|
|
|
"/../../../../windows/win.ini" |