Lotus Domino @SetHTTPHeader Permits HTTP Response Splitting Attacks
|
|
SecurityTracker Alert ID: 1013839 |
|
SecurityTracker URL: http://securitytracker.com/id/1013839
|
|
CVE Reference:
GENERIC-MAP-NOMATCH
(Links to External Site)
|
Date: Apr 29 2005
|
Impact:
Modification of system information, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 6.0.x, 6.5.x; prior to 6.0.5, prior to 6.5.4
|
Description:
An input validation vulnerability was reported in Lotus Domino. A local user with certain privileges can conduct HTTP response splitting attacks.
A local user with application installation privileges can create specially crafted code that invokes the @SetHTTPHeader function to inject arbitrary content into the HTTP header returned by the server. This permits HTTP response splitting attacks. A user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks.
The vendor credits Juan C. Calderon with reporting this vulnerability.
The vendor disclosed this vulnerability.
|
Impact:
A local user may be able to poison any intermediate web caches with arbitrary content.
|
Solution:
The vendor has issued fixed versions (6.0.5, 6.5.4).
The vendor's advisory is available at:
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202437
|
Vendor URL: www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202437 (Links to External Site)
|
Cause:
Input validation error
|
Underlying OS: Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000)
|
|
Message History:
None.
|
Source Message Contents
|
|
|
[Original Message Not Available for Viewing]
|
|