[18583] in bugtraq
Re: Lotus Response to "Domino Server Directory Traversal
daemon@ATHENA.MIT.EDU (Vinci Chou)
Fri Jan 12 15:55:59 2001
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <3A5D57CD.6307CC7@bigfoot.com>
Date: Thu, 11 Jan 2001 14:50:54 +0800
Reply-To: Vinci Chou <Captainbig@BIGFOOT.COM>
From: Vinci Chou <Captainbig@BIGFOOT.COM>
X-To: Katherine Spanbauer <Katherine_Spanbauer@LOTUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
Katherine Spanbauer wrote:
> Lotus has published the following statement regarding the recently
reported
> issue "Domino Server Directory Traversal Vulnerability". This
information
> will be posted to the Lotus web site at
http://www.lotus.com/security.
> + "Mapping" tab
> Incoming URL: */../*
I noticed that the page at www.lotus.com/security was updated minutes
ago to say
Incoming URL: *..*
instead of
Incoming URL: */../*
because the latter can be bypassed if a "/" is replaced by "\" as
pointed out by others in the LNotes-L mailing list. Though you won't
get the "\" to work if you use Netscape client in this case, other
clients or telnet do.
Any other patterns are insufficient.
Regards,
Vinci