Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-2428 — IBM Lotus Domino vulnerability

7 documents5 sources
Severity
5.0MEDIUMNVD
EPSS
8.6%
top 7.56%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 3
Latest updateMay 1

Description

Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the Clnt…

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages1 packages

â–¶NVDibm/lotus_domino5.0, 6.0, 6.5+2

🔴Vulnerability Details

2
GHSA
GHSA-wj9f-4cpj-jvg9: Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names↗2022-05-01
â–¶
CVEList
CVE-2005-2428: Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names↗2005-08-03
â–¶

💥Exploits & PoCs

4
Exploit-DB
IBM Lotus Domino R8 - Password Hash Extraction↗2016-02-25
â–¶
Exploit-DB
Lotus Domino R6 Webmail - Remote Password Hash Dumper↗2007-02-13
â–¶
Nuclei
Lotus Domino R5 and R6 WebMail - Information Disclosure
â–¶
Nuclei
Lotus Domino Security Checks
â–¶
CVE-2005-2428 — IBM Lotus Domino vulnerability | cvebase