Potential script insertion vulnerabilities in Domino Web Access (DWA)
Secunia contacted IBM Lotus to report several script insertion vulnerabilities in Lotus Domino Web Access.
The advisory address is as follows:
Diagnosing the problem
The first issue reports that attached files are opened in the context of the site if the user clicks on it. Beginning with Domino 6.5.4 FP1, attached files are opened in a new window when the user clicks it. After clicking to open the file, the user must take action to "Allow Blocked Content" if it contains active content by right clicking to bring up the context menu.
The user is prompted with a Security Warning dialog box, "Allowing active content such as script and ActiveX controls can be useful, but active content might also harm your computer. Are you sure you want to let this file run on your computer?".
The active content will run only if the user clicks "Yes".
Resolving the problem
These three issues were reported to IBM Lotus Quality Engineering as SPRs# KEMG6FKU9G, KEMG6FKUBP, KEMG6FKUBT and have been addressed in Domino 6.5.5 and Domino 7.0.1.
Refer to the Upgrade Central site for details on upgrading Notes/Domino.
More support for:
Lotus End of Support Products
Lotus Domino Web Access
Software version: 6.0, 6.5, 7.0
Operating system(s): AIX, IBM i, Linux, Solaris, Windows, z/OS
Reference #: 1229919
Modified date: 2006-02-10