13th Feb 2003 [SBWID-5989]
COMMAND
Lotus Domino DOT Bug Allows for Source Code Viewing
SYSTEMS AFFECTED
Verified in Lotus Domino version 5 & 6
PROBLEM
Faz [[email protected]] found :
If you append a period to the end of a non-default Lotus file type (non
.NSF, .NTF, etc) via your browser URL request, you will be prompted to
download the file. This has a possible repercussion of the ability to
view the source code for such add-in web handlers such as Crystal
Reports, Perl scripts and others. In some cases (such as Crystal
Reports) where such file types are server-side run (similar to .ASP),
they may reference additional INCLUDE files that contain logins and
passwords. An attacker can easily use this technique to view the
server-side source code and additional INCLUDE files to obtain private
information.
For example:
http://some.dominoserver.com/reports/secretreport.csp. <-- End the URL with a <period>
http://some.dominoserver.com/cgi-bin/myscript.pl . <-- notice the <space><period>
http://some.dominoserver.com/cgi-bin/runme.exe%20. <-- combination of hex <space> and an ASCII period
http://some.dominoserver.com/reports/secretreport.csp%20%2E <-- All hex values
will return the actual .CSP source code instead of the compiled report.
This seems to work for all types of non-native Lotus Domino file types.
A short term workaround is to create Domino redirection filters for the
various non-native file types and ending them with the combinations
above, but some creative formatting of the URL can easily bypass these
redirection filters.
SOLUTION
None yet