Vulnerabilities > CVE-2004-1003 - Unspecified vulnerability in Trend Micro Scanmail Domino 2.51/2.6

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
trend-micro
nessus
exploit available

Summary

Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.

Vulnerable Configurations

Part Description Count
Application
Trend_Micro
2

Exploit-Db

descriptionTrend Micro ScanMail for Domino 2.51/2.6 Remote File Disclosure Vulnerability. CVE-2004-1003. Remote exploits for multiple platform
idEDB-ID:24725
last seen2016-02-02
modified2004-11-05
published2004-11-05
reporterDokFLeed
sourcehttps://www.exploit-db.com/download/24725/
titleTrend Micro ScanMail for Domino 2.51/2.6 - Remote File Disclosure Vulnerability

Nessus

NASL familyCGI abuses
NASL idLOTUS_SMENCY.NASL
descriptionThis script attempts to read sensitive files used by Trend ScanMail, an antivirus protection program for Domino (formerly Lotus Notes). An attacker, exploiting this flaw, may gain access to confidential data or disable the antivirus protection.
last seen2020-06-01
modified2020-06-02
plugin id14312
published2004-08-19
reporterThis script is Copyright (C) 2004-2018 by DokFLeed
sourcehttps://www.tenable.com/plugins/nessus/14312
titleTrend Micro Scanmail for Domino nsf File Information Disclosure
code
# Written by DokFLeed <dokfleed at dokfleed.net>
# Looking for smency.nsf Trend/Lotus
#

# Changes by Tenable:
# - Revised plugin title (4/3/2009)


include("compat.inc");

if(description)
{
   script_id(14312);
   script_version ("1.17");

   script_cve_id("CVE-2004-1003");
   script_bugtraq_id(11612);

   script_name(english:"Trend Micro Scanmail for Domino nsf File Information Disclosure"); 

 script_set_attribute(attribute:"synopsis", value:
"The remote antivirus is vulnerable to several flaws." );
 script_set_attribute(attribute:"description", value:
"This script attempts to read sensitive files used by Trend ScanMail,
an antivirus protection program for Domino (formerly Lotus Notes).
An attacker, exploiting this flaw, may gain access to confidential
data or disable the antivirus protection." );
 script_set_attribute(attribute:"solution", value:
"Password protect those files.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/08/19");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/07");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:trend_micro:scanmail_domino");
 script_end_attributes();

   script_summary(english:"Checks for the presence ScanMail files"); 
   script_category(ACT_GATHER_INFO); 
   script_family(english:"CGI abuses"); 
   script_copyright(english:"This script is Copyright (C) 2004-2020 by DokFLeed"); 
   script_dependencie("find_service1.nasl", "http_version.nasl");
   script_require_ports("Services/www", 80);
   exit(0); 
}

# Start of Code  
include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80, embedded:TRUE);

if (!get_port_state(port)) exit(0);


files = make_array("/smency.nsf"   , "Encyclopedia",
                   "/smconf.nsf"   , "Configuration",
                   "/smhelp.nsf"   , "Help",
                   "/smftypes.nsf" , "File Types",
                   "/smmsg.nsf"    , "Messages",
                   "/smquar.nsf"   , "Quarantine",
                   "/smtime.nsf"   , "Scheduler",
                   "/smsmvlog.nsf" , "Log",
                   "/smadmr5.nsf"  , "Admin Add-in");
report = "";
foreach path (keys(files))
{
  req = http_get(item:path, port:port);
  r = http_keepalive_send_recv(port:port, data:req);

  if (r == NULL) exit(0);

  if ("Trend ScanMail" >< r)
  {
    if (!report)
    {
      report =
"The following files were found:
";
    }
    report += string("\n    ", path, " - ", files[path]);
  }
}
if (report) security_warning(port:port, extra:report);