Vulnerability Details : CVE-2005-2428
Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
Products affected by CVE-2005-2428
- cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_domino:6.5:*:*:*:*:*:*:*
Threat overview for CVE-2005-2428
Top countries where our scanners detected CVE-2005-2428
Top open port discovered on systems with this issue
143
IPs affected by CVE-2005-2428 16
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2005-2428!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2005-2428
1.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2428
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2005-2428
-
http://securitytracker.com/id?1014584
-
http://marc.info/?l=bugtraq&m=112240869130356&w=2
-
http://www-1.ibm.com/support/docview.wss?uid=swg21212934
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/21556
-
http://www.securiteam.com/securitynews/5FP0E15GLQ.html
-
http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
Vendor Advisory
-
https://www.exploit-db.com/exploits/39495/
-
http://www.securityfocus.com/bid/14389
Jump to