博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
BF and IA vulnerabilities in IBM Lotus Domino
阅读量:2434 次
发布时间:2019-05-10

本文共 3893 字,大约阅读时间需要 12 分钟。

Hello list!
I want to warn you about Brute Force and Insufficient Authentication
vulnerabilities in IBM Lotus Domino. These are vulnerabilities in Domino,
which I've found at 03.05.2012 together with other holes.
Last year I've announced multiple vulnerabilities in IBM software and after
IBM fixed many of them, I've disclosed them. They fixed almost all
vulnerabilities (with few exceptions, like Brute Force in IBM Lotus Notes
Traveler), which I've informed them in May and December, and concerning
other holes they always told, that they were working on them. After IBM
released Domino 9.0 last month and still not answered concerning these
vulnerabilities, I've reminded IBM and they answered, that they would not be
fixing them.
-------------------------
Affected products:
-------------------------
Vulnerable are IBM Lotus Domino 8.5.3, 8.5.4, 9.0 and previous versions.
These vulnerabilities haven't been fixed non in Domino 8.5.4 (released in
August 2012), nor in Domino 9.0 (released in Match 2013).
As recently IBM told me, almost after a year since my informing about these
vulnerabilities, they didn't fixed them, as they didn't see a need in it.
Because, according to them, there are built-in mechanisms in Domino for
protecting against BF and IA, so these holes are not a problem of the
application (but a problem of specific web sites). I.e. they meant, that
owners of web sites with Lotus Domino need to better configure it for
protection against these attacks.
-------------------------
Affected vendors:
-------------------------
IBM Domino (formerly IBM Lotus Domino)
----------
Details:
----------
Brute Force (WASC-11):
These pages, which require authentication, have no protection against Brute
Force attacks:
There are two variants of login form: Basic Authentication (I found it
during pentest already in 2008) and form-based authentication (I found it
during pentest in 2012, alongside with the first variant). In both cases
there is no protection against Brute Force.
Insufficient Authentication (WASC-01):
Unprivileged user (with any account at the site, access to which can be
received via Brute Force vulnerability) has access to the next pages:
- leakage of information about all users (names,
surnames, logins, e-mails and other personal information and settings)
- leakage of information about administration
requests, including personal information (names, surnames, logins, etc.)
- leakage of important information about files at
the server, about installed applications and their settings (Application
Catalog), including personal information (names, surnames, logins, etc.)
- leakage of information about events (Monitoring
Configuration)
After receiving access to names.nsf, it's possible to use Information
Leakage vulnerability, which found by Leandro Meiners in 2005 (for getting
password hashes) and which is still not fixed. IBM hasn't fixed it in
default configuration, but only recommended to remove hash field from
profiles or to use salted hashes. My client has used exactly Lotus salted
hashes and it hasn't helped (99% of hashes were picked up, including admin's
one).
------------
Timeline:
------------ 
Full timeline read in the first advisory
(
).
- During 16.05-20.05.2012 I've wrote announcements about multiple
vulnerabilities in IBM software at my site.
- During 16.05-20.05.2012 I've wrote five advisories via contact form at IBM
site.
- At 31.05.2012 I've resend five advisories to IBM PSIRT, which they
received and said they would send them to the developers (of Lotus
products).
- At 18.08.2012 I've reminded IBM about these holes and gave enough
arguments to fix them.
- At 14.04.2013 I've again remind IBM about these holes.
- At 23.04.2013 IBM answered that they would not fix these holes.
- At 26.04.2013 I've disclosed these vulnerabilities at my site
(
).
Best wishes & regards,
MustLive
Administrator of Websecurity web site

转载地址:http://nzemb.baihongyu.com/

你可能感兴趣的文章
设置MathType标签的教程
查看>>
在Word中插入几何画板图形的方法
查看>>
约耳测试: 迈向高品质的12个步骤(下) (转)
查看>>
Borland C++ Mobile Edition为手机开发保驾护航! (转)
查看>>
EnableViewState="false"的DataGrid分页 (转)
查看>>
VC++ ADO开发实践之三 (转)
查看>>
透析ICMP协议(四): 牛刀初试之二 应用篇ping(RAW Socket) (转)
查看>>
让css使网页图片半透明 (转)
查看>>
VC++ ADO开发实践之六 (转)
查看>>
用Visual C++编写电子邮件程序 (转)
查看>>
快速创建非控件分页(ASP3.0方式) (转)
查看>>
XML + XSL + JS 构建小型Web App (十五) (转)
查看>>
VC++ ADO开发实践之五 (转)
查看>>
JIURL玩玩Win2k 参考资料 (转)
查看>>
理解对象以及对象的属性、方法、事件 (转)
查看>>
Java语言和C++语言的差异 (转)
查看>>
快速查找对方IP技术总汇(转)
查看>>
在TCP三次握手后插入伪造的TCP包(转)
查看>>
ASP实现语音分时问候 (转)
查看>>
Windows 98 整理磁盘碎片(转)
查看>>