Overview
Lotus Domino R5 Servers are vulnerable to a cross-site scripting vulnerability. A web site may inadvertently include malicious HTML tags or script(JavaScript, VBScript, Java, etc.) in a dynamically generated page based on unvalidated input from untrustworthy sources. This can be a problem when a web server does not adequately ensure that generated pages are properly encoded to prevent unintended execution of scripts, and when input is not validated to prevent malicious HTML from being presented to the user.
Description
It is possible to use a "cross-site" scripting technique to inject malicious script (JavaScript, VBScript, etc.) or HTML into a web page. Several server applications are vulnerable to such an technique via various default error pages. |
Impact
The victim will be presented with information which the compromised site did not wish their visitors to be subjected. This could be used to "sniff" sensitive data from within the web page, including passwords, credit card numbers, and any arbitrary information the user inputs. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
A web master may change the default error page to not include the file name passed in by any user. The client may disable JavaScript (or VBScript or other scripting languages), but it doesn't address the problem of simply inserting malicious HTML, and it can cause undesired functionality. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A |
References
Acknowledgements
Our thanks to Hiromitsu Takagi, who discovered this instance of the cross-site scripting vulnerability.
This document was originally written by Shawn Hernan in July 2000. It has been adapted for this instance by Jason Rafail.
Other Information
CVE IDs: | None |
Severity Metric: | 55.69 |
Date Public: | 2001-07-02 |
Date First Published: | 2001-07-27 |
Date Last Updated: | 2001-07-30 19:00 UTC |
Document Revision: | 17 |