Overview
IBM Notes parses arbitrary JAVA and Javascript code by default when viewing emails.
Description
The n.runs AG security advisory states: Notes 8.5.3 does not filter <applet> tags inside HTML emails. This can be used to load arbitrary Java applets from remote sources (making it an information disclosure as well as this can be used to trigger an HTTP request once the mail is previewed/opened). |
Impact
A remote unauthenticated attack may be able to execute arbitrary code in the context of the user viewing emails within IBM Notes. |
Solution
Apply an Update |
The following directives should be set to zero in notes.ini to reduce the attack surface.
Although not needed to mitigate this vulnerability, if plugins are not needed we recommend the following directive also be set to zero.
Alternatively, in Notes Basic Preferences, deselect the following three preferences:
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5.8 | AV:N/AC:M/Au:N/C:P/I:P/A:N |
Temporal | 5 | E:ND/RL:OF/RC:C |
Environmental | 3.8 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
- https://www-304.ibm.com/support/docview.wss?uid=swg21633819
- https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_notes_accepts_java_applet_and_javascript_tags_inside_html_emails_cve_2013_0127_cve_2013_0538?lang=en_us
- https://www.nruns.com/fileadmin/downloads/advisories/2013/n.runs-SA-2013.005-Lotus_Notes_Java_Applets.txt
- http://seclists.org/fulldisclosure/2013/Apr/262
- http://www.ibm.com/developerworks/java/jdk/alerts/
Acknowledgements
Thanks to Alexander Klink for reporting this vulnerability.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2013-0127, CVE-2013-0538 |
Date Public: | 2013-04-30 |
Date First Published: | 2013-05-01 |
Date Last Updated: | 2014-07-30 17:30 UTC |
Document Revision: | 43 |