RE: Vulnerability discovered on Lotus Domino server "admin4.nsf"

From: Enrique A. Sanchez Montellano (enrique.sanchez@hypersec.co.uk)
Date: Tue Mar 07 2006 - 19:56:34 EST


Check out the accounts, you can even (if the admin didn't change anything)
try to download passwords ore ven certificates, Works pretty nice ...

Enrique A. Sanchez Montellano
Security Consultant

-----Mensaje original-----
De: 3 shool [mailto:3shool@gmail.com]
Enviado el: Martes, 07 de Marzo de 2006 02:23 p.m.
Para: Enrique A. Sanchez Montellano; pen-test@securityfocus.com
Asunto: Re: Vulnerability discovered on Lotus Domino server "admin4.nsf"

Thanks Enrique.

> I would suggest you add up an account so client know you are there, you
> don't want any lawsuits because of freaky admins do you?

Actually I only have read access to the admin4.nsf database. I
couldn't find any link or button that would enable me to modify or
create on the system.

I thought admin4.nsf only has some reporting to provide. Can we use
admin4.nsf by providing some parameters on the url or form to do
something more?

> Should work ok, the best manual is the lotus manual, I have them in print
> but you can check them out electronically im shure ...

I'll have a look at the lotus manual.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:38 EDT