6695865 2001-07-02 20:38 +0900  /74 rader/ TAKAGI, Hiromitsu <takagi@etl.go.jp>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-02  18:08  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern kopiemottagare: security-alert@lotus.com
Mottagare: Bugtraq (import) <17736>
Ärende: Lotus Domino Server Cross-Site Scripting Vulnerability
------------------------------------------------------------
From: "TAKAGI, Hiromitsu" <takagi@etl.go.jp>
To: bugtraq@securityfocus.com
Cc: security-alert@lotus.com
Message-ID: <20010702203751.1291.TAKAGI@etl.go.jp>

Lotus Domino Server Cross-Site Scripting Vulnerability
======================================================

Affected products:
=================
  Lotus Domino Server 5.0.6
  <http://www.lotus.com/home.nsf/welcome/domino/>

Vendor status:
=============
  Notified: 
    18 Mar 2001 09:59:51 +0900 (105 days before), security@lotus.com
  Response:
    20 Mar 2001 13:36:29 -0500
    > Dear Hiromitsu Tagaki,
    > I would like to thank you for bringing this issue to our attention.  Lotus
    > takes all reports of this nature very seriously and we will investigate
    > immediately.
    > For future reference, may I ask that you contact us at
    > security-alert@lotus.com?
    ...
    > Senior Product Manager, Notes and Domino Security
    > Lotus Development Corporation
  Fix: 
    Unknown
  Announcement: 
    Unknown
    http://www.lotus.com/developers/itcentral.nsf/wSecurity?OpenView

Problem:
=======
  Accessing the following URL, the JavaScript code will be executed
  in the browser on the server's domain.

  http://www.lotus.com/home.nsf/<img%20src=javascript:alert(document.domain)>

  This page produces output like this:
  =================================================
  Error 404
  HTTP Web Server: Couldn't find design note - ******

  ----------------------------------------------------------------------------
  Lotus-Domino Release 5.0.6a
  =================================================
  ******: The JavaScript code is executed here.

  This vulnerability is quite similar to "IIS cross-site scripting
  vulnerabilities (MS00-060)" reported by Microsoft on August 25, 2000.
  <http://www.microsoft.com/technet/security/bulletin/ms00-060.asp>

Impact:
======
  For the detail about cross-site scripting, see the following pages.
  <http://www.cert.org/advisories/CA-2000-02.html>
  <http://www.microsoft.com/TechNet/security/crssite.asp>

Workaround:
==========
  Customize error pages.


--
Hiromitsu Takagi, Ph.D.
National Institute of Advanced Industrial Science and Technology,
Tsukuba Central 2, 1-1-1, Umezono, Tsukuba, Ibaraki 305-8568, Japan
http://www.etl.go.jp/~takagi/
(6695865) /TAKAGI, Hiromitsu <takagi@etl.go.jp>/(Ombruten)
6697747 2001-07-02 14:40 -0400  /114 rader/  <Katherine_Spanbauer@lotus.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-03  04:25  av Brevbäraren
Extern mottagare: takagi@etl.go.jp
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <17758>
Ärende: Re: Lotus Domino Server Cross-Site Scripting Vulnerability
------------------------------------------------------------
From: Katherine_Spanbauer@lotus.com
To: takagi@etl.go.jp
Cc: bugtraq@securityfocus.com
Message-ID: <OFCD85B6CE.D39A4A34-ON85256A7D.0055F019@lotus.com>

This was reproduced and documented as SPR #JCHN4V2HUY.  We are
currently researching a fix and have plans to address in Domino
R5.0.9.  When the fix is available, it will be documented at
http://www.notes.net/r5fixlist.nsf.

Regards,
Katherine

------------------------------------------------------------------------------------

Katherine Spanbauer
Senior Product Manager, Notes and Domino Security
Lotus Development Corporation






                                                                                                                   
                    "TAKAGI,                                                                                       
                    Hiromitsu"           To:     bugtraq@securityfocus.com                                         
                    <takagi@etl.g        cc:     security-alert@lotus.com                                          
                    o.jp>                Subject:     Lotus Domino Server Cross-Site Scripting Vulnerability       
                                                                                                                   
                    07/02/2001                                                                                     
                    07:38 AM                                                                                       
                                                                                                                   
                                                                                                                   




Lotus Domino Server Cross-Site Scripting Vulnerability
======================================================

Affected products:
=================
  Lotus Domino Server 5.0.6
  <http://www.lotus.com/home.nsf/welcome/domino/>

Vendor status:
=============
  Notified:
    18 Mar 2001 09:59:51 +0900 (105 days before), security@lotus.com
  Response:
    20 Mar 2001 13:36:29 -0500
    > Dear Hiromitsu Tagaki,
    > I would like to thank you for bringing this issue to our attention.
Lotus
    > takes all reports of this nature very seriously and we will
investigate
    > immediately.
    > For future reference, may I ask that you contact us at
    > security-alert@lotus.com?
    ...
    > Senior Product Manager, Notes and Domino Security
    > Lotus Development Corporation
  Fix:
    Unknown
  Announcement:
    Unknown
    http://www.lotus.com/developers/itcentral.nsf/wSecurity?OpenView

Problem:
=======
  Accessing the following URL, the JavaScript code will be executed
  in the browser on the server's domain.


http://www.lotus.com/home.nsf/<img%20src=javascript:alert(document.domain)>

  This page produces output like this:
  =================================================
  Error 404
  HTTP Web Server: Couldn't find design note - ******


----------------------------------------------------------------------------

  Lotus-Domino Release 5.0.6a
  =================================================
  ******: The JavaScript code is executed here.

  This vulnerability is quite similar to "IIS cross-site scripting
  vulnerabilities (MS00-060)" reported by Microsoft on August 25, 2000.
  <http://www.microsoft.com/technet/security/bulletin/ms00-060.asp>

Impact:
======
  For the detail about cross-site scripting, see the following pages.
  <http://www.cert.org/advisories/CA-2000-02.html>
  <http://www.microsoft.com/TechNet/security/crssite.asp>

Workaround:
==========
  Customize error pages.


--
Hiromitsu Takagi, Ph.D.
National Institute of Advanced Industrial Science and Technology,
Tsukuba Central 2, 1-1-1, Umezono, Tsukuba, Ibaraki 305-8568, Japan
http://www.etl.go.jp/~takagi/
(6697747) / <Katherine_Spanbauer@lotus.com>/(Ombruten)