XSS Vulnerabilities in Domino
An IBM Technote updated on 15 Aug 2012 points to a set of XSS vulnerabilities in the Lotus Domino server. You also can read the disclosure on seclist.org about that. But first go to your server configuration document and add:
Welcome back (You don't edit the notes.ini directly don't you!). When looking at XSS vulnerabilities, they follow the same pattern as SQL injections: Input that has been provided by the user is not fully sanitised and used for output generation. In web applications the " usual suspects" for such attacks are:
As usual YMMV
DominoValidateFramesetSRC=1
Welcome back (You don't edit the notes.ini directly don't you!). When looking at XSS vulnerabilities, they follow the same pattern as SQL injections: Input that has been provided by the user is not fully sanitised and used for output generation. In web applications the " usual suspects" for such attacks are:
- Framesets
- URL parameters
- Error and redirection pages
- Form submissions
- Type of rule: HTTP response headers
- Incoming URL pattern: */xsp/.ibmxspres/*
- HTTP response codes: 404
- Expires header: Don't add header
- Custom header: Content-Type : text/plain (overwrite)
- Type of rule: HTTP response headers
- Incoming URL pattern: */xsp/.ibmmodres/*
- HTTP response codes: 404
- Expires header: Don't add header
- Custom header: Content-Type : text/plain (overwrite)
As usual YMMV
Posted by Stephan H Wissel on 06 September 2012 | Comments (1) | categories: Show-N-Tell Thursday