[18583] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Lotus Response to "Domino Server Directory Traversal

daemon@ATHENA.MIT.EDU (Vinci Chou)
Fri Jan 12 15:55:59 2001

MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID:  <3A5D57CD.6307CC7@bigfoot.com>
Date:         Thu, 11 Jan 2001 14:50:54 +0800
Reply-To: Vinci Chou <Captainbig@BIGFOOT.COM>
From: Vinci Chou <Captainbig@BIGFOOT.COM>
X-To:         Katherine Spanbauer <Katherine_Spanbauer@LOTUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

Katherine Spanbauer wrote:

>  Lotus has published the following statement regarding the recently
reported
>  issue "Domino Server Directory Traversal Vulnerability".  This
information
>  will be posted to the Lotus web site at
http://www.lotus.com/security.

>    + "Mapping" tab
>           Incoming URL:  */../*

I noticed that the page at www.lotus.com/security was updated minutes
ago to say
          Incoming URL: *..*
instead of
          Incoming URL:  */../*

because the latter can be bypassed if a "/" is replaced by "\" as
pointed out by others in the LNotes-L mailing list.  Though you won't
get the "\" to work if you use Netscape client in this case, other
clients or telnet do.

Any other patterns are insufficient.

Regards,
Vinci

home help back first fref pref prev next nref lref last post