CERT-In Advisory
CIAD-2004-0014
Lotus Domino/Notes Cross-Site Scripting and Arbitrary Code Execution vulnerability
Original Issue Date: June 25, 2004
Severity Rating: Medium
Systems Affected
- Lotus Domino R6
- Lotus Notes R6.x
- Lotus Notes R6.x Client
Overview
Two vulnerabilities have been reported in Lotus Domino/Notes which uses cross-site scripting and Lotus Notes URL Handler Argument Injection Vulnerability to compromise a vulnerable system.
Description
The two vulnerabilities which have been reported in Lotus Notes and Lotus Domino are: Cross-site Scripting Vulnerability Cross-site scripting XSS occurs when an attacker introduces malicious scripts to a dynamic form that allows the attacker to capture the private session information.
Lotus Notes URL Handler Argument Injection Vulnerability
Remote exploitation of a parameter filtering vulnerability in Lotus Notes application allows remote attackers to execute arbitrary code. An attacker can force a user to start Lotus Notes with a custom notes.ini file that is under the attacker's control and specifies a custom data directory that is also under the attacker's control. The attacker can create a malicious DLL containing arbitrary code that will be loaded and executed when notes.exe is starting up.
Successful exploitation allows remote attackers to execute arbitrary code under the privileges of the user that invoked the "notes:" URL handler with an affected version of Lotus Notes. The malicious URL can be transmitted to a target via e-mail or web and can also be embedded within an HTML IMG tag.
Solution
These vulnerabilities have been resolved in versions 6.0.4 and 6.5.2.
Workaround
The Lotus Notes URL Handler Argument Injection Vulnerability and can be prevented if the use of Internet shares is restricted via firewall configuration or registry settings, It will also fail if the Notes client is already running on the user's workstation.
Vendor Information
IBM - Cross-site Scripting Vulnerability Addressed in 6.0.4 and 6.5.2:
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21171253
IBM - Lotus Notes URL Handler Argument Injection Vulnerability:
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21169510
References
iDEFENSE
http://www.idefense.com/application/poi/display?id=111&type=vulnerabilities
Secunia Advisory SA11923
http://secunia.com/advisories/11925/
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|