Vulnerabilities > CVE-2004-1621 - Unspecified vulnerability in IBM Lotus Domino

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ibm
nessus
exploit available

Summary

NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in IBM Lotus Notes R6 and Domino R6, and possibly earlier versions, allows remote attackers to execute arbitrary web script or HTML via square brackets at the beginning and end of (1) computed for display, (2) computed when composed, or (3) computed text element fields. NOTE: the vendor has disputed this issue, saying that it is not a problem with Notes/Domino itself, but with the applications that do not properly handle this feature

Exploit-Db

descriptionIBM Lotus Domino 6.x Cross-Site Scripting and HTML Injection Vulnerabilities. CVE-2004-1621. Webapps exploit for unix platform
idEDB-ID:24690
last seen2016-02-02
modified2004-10-18
published2004-10-18
reporterJuan C Calderon
sourcehttps://www.exploit-db.com/download/24690/
titleIBM Lotus Domino 6.x - Cross-Site Scripting and HTML Injection Vulnerabilities

Nessus

NASL familyCGI abuses : XSS
NASL idDOMINO_XSS2.NASL
descriptionThe remote server is vulnerable to cross-site scripting, when requesting a .nsf file with html arguments, as in : GET /FormReflectingURLValue?OpenForm&Field=[XSS]
last seen2020-06-01
modified2020-06-02
plugin id15514
published2004-10-19
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15514
titleIBM Lotus Notes/Domino Square Brackets Encoding Failure XSS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(15514);
 script_version("1.16");
 script_cvs_date("Date: 2018/07/10 14:27:30");

 script_cve_id("CVE-2004-1621");
 script_bugtraq_id(11458);

 script_name(english:"IBM Lotus Notes/Domino Square Brackets Encoding Failure XSS");
 script_summary(english:"Checks for Lotus Domino XSS");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is prone to a cross-site scripting attack.");
 script_set_attribute(attribute:"description", value:
"The remote server is vulnerable to cross-site scripting, when requesting 
a .nsf file with html arguments, as in :

GET /FormReflectingURLValue?OpenForm&Field=[XSS]");
 script_set_attribute(attribute:"solution", value:
"None at this time.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value:"2004/10/19");
 script_set_attribute(attribute:"vuln_publication_date", value:"2004/10/18");
 script_set_attribute(attribute:"patch_publication_date", value:"2004/10/18");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:lotus_domino");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses : XSS");
 script_dependencie("cross_site_scripting.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80, embedded: 0);

banner = get_http_banner(port:port);
if ( ! banner ) exit(0);
if ( "Lotus Domino" >!< banner ) exit(0);
if(get_kb_item(string("www/", port, "/generic_xss"))) exit(0);

	
r = http_send_recv3(item:"/FormReflectingURLValue?OpenForm&Field=%5b%3cscript%3efoo%3cscript%3e%5d", port:port, method: "GET");
if (isnull(r)) exit (0);
if ( "<script>foo</script>" >< r[2] )
{
 security_warning(port);
 set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
}