Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   IBM iNotes and Domino Vendors:   IBM
IBM Domino Input Validation Flaw in 'user.nsf' Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1032443
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jun 1 2015
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  
Version(s): Tested on 8.5.3, 8.5.4; Possibly affecting 9.0 and 9.0.1 and prior versions
Description:   A vulnerability was reported in IBM Domino. A remote user can conduct cross-site scripting attacks.

A remote user with knowledge of valid hashes in the address of an email message can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Domino software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A demonstration exploit URL is provided:


The original advisory is available at:

MustLive reported this vulnerability.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM Domino software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  [FD] XSS vulnerability in IBM Domino

Hello list!

I want to warn you about Cross-Site Scripting vulnerability in IBM Domino. 
This is one from many vulnerabilities in Domino, which I've found at 
03.05.2012. In previous years I wrote about multiple vulnerabilities in 
Lotus Domino ( and Lotus Notes 
Traveler (

During 2012-2013 I informed IBM that have other holes in Domino (as this 
XSS), besides previous holes, but they were not interested.

Affected products:

Vulnerable are IBM Lotus Domino 8.5.3, 8.5.4 (in which I tested) and 
previous versions. Versions Domino 9.0 and 9.0.1 also must be vulnerable 
(since IBM hasn't fix it earlier).

Affected vendors:

IBM Domino (formerly IBM Lotus Domino)


Cross-Site Scripting (WASC-08):


For conducting XSS attack it's needed to know hashes in address of a letter. 
They can be found via information leakage (i.e. embedded image) or via other 
XSS vulnerability.


Full timeline read in the first advisory 

- During 16.05-20.05.2012 I've wrote announcements about multiple 
vulnerabilities in IBM software at my site.
- During 16.05-20.05.2012 I've wrote five advisories via contact form at IBM 
- At 31.05.2012 I've resend five advisories to IBM PSIRT, which they 
received and said they would send them to the developers (of Lotus 
- At 18.08.2012 I've reminded IBM about multiple holes and gave enough 
arguments to fix them.
- At 14.04.2013 I've again remind IBM about Brute Force and Insufficient 
Authentication holes.
- At 23.04.2013 IBM answered that they would not fix Brute Force and 
Insufficient Authentication holes and don't interested in this XSS.
- During 15.02.2013-26.04.2013 I disclosed at my site about previous 
vulnerabilities IBM Lotus Domino.
- At 26.05.2015 I've disclosed this vulnerability at my site 

Best wishes & regards,
Administrator of Websecurity web site 

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC