First published: Wed Aug 03 2005(Updated: )
Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Lotus Domino R5 | =6.0 | |
IBM Lotus Domino R5 | =6.5 | |
IBM Lotus Domino R5 | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2428 is considered a medium severity vulnerability due to the potential exposure of sensitive information.
Fix CVE-2005-2428 by disabling the 'Generate HTML for all fields' option in Lotus Domino WebMail configuration.
CVE-2005-2428 exposes sensitive information such as password hashes stored in hidden form fields.
CVE-2005-2428 affects Lotus Domino versions 5.0, 6.0, and 6.5.
Remote attackers can exploit CVE-2005-2428 if they can access the HTML source of the affected WebMail application.