CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
89.5%
Lotus Domino Servers 5.x, 4.6x, and 4.5x allow users to associate objects with documents in a database. While these objects appear to be a part of the document, they are actually stored as separate files. A vulnerability exist by which an intruder could view these objects regardless of the permissions set on the document to which they belong.
Lotus Notes allows users to associate objects with documents in a database. While these objects appear to be a part of the document, they are actually stored as separate files. Access to the documents and objects are controlled by the database ACL, however, the use of the Reader and Author lists can further restrict access to individual documents . The Reader and Author lists modify access only to the documents themselves and not to associated objects. Therefore an intruder who does not have access to a document, because of permissions set by the Reader and Author lists, can still access the objects associated with that document. Using Notes API calls an intruder can directly open the desired object if the Notes unique document ID of that object is known. The intruder must be able to access the target database in order to exploit this vulnerability. Lotus has released a Tech Note to address this problem.
An intruder can view objects that they do not have permission to view.
Upgrade to Notes/Domino R5.0.10.
A workaround is to use document encryption to protect rich text fields that contain attachments. Documents can be encrypted using either public encryption keys (for example, the keys of the users listed in the reader names field) or using secret encryption keys.
657899
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: September 18, 2001 Updated: April 08, 2002
Affected
R5.0.10 is now available and the technote has been updated
http://www-1.ibm.com/support/manager.wss?rs=1&rt=0&org=sims&doc=CCA46CF459BA6E4A85256AE3007C92C1
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23657899 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was discovered by Joshua Jore.
This document was written by Jason Rafail and is based on the Tech Note released by Lotus to address this issue.
CVE IDs: | CVE-2002-0037 |
---|---|
Severity Metric: | 1.41 Date Public: |