source: http://www.securityfocus.com/bid/9900/info It has been reported that Lotus Domino may be prone to a directory traversal vulnerability that may allow a remote attacker to access information outside the server root directory. The issue reportedly exists in the server's administrative interface accessed via 'webadmin.nsf'. The vulnerability may be exploited by a remote attacker by traversing outside the server root directory by using '../' directory traversal character sequences. Successful exploitation of this vulnerability may allow a remote attacker to gain access to sensitive information and/or modify the underlying file system. IBM Lotus Domino server 6.5.1 has been reported to be prone to this issue, however, it is possible that other versions are affected as well. 1)Go to http://www.example.com/webadmin.nsf 2)Go to "Files" tab 3)From the "Tools" menu select to create a "new" folder 4)As the name of the new folder enter "/../../../../../../pr00f" or "/../../../../windows/win.ini"
Related ExploitsTrying to match CVEs (1): CVE-2004-2311
Trying to match OSVDBs (1): 19834
Other Possible E-DB Search Terms: IBM Lotus Domino 6/7, IBM Lotus Domino 6, IBM Lotus Domino