Two vulnerabilities reported in Domino 6.5.2

Peter Bochner
Secunia, a security firm that monitors vulnerabilities in more than 5,500 products, is today saying on its Web site that two vulnerabilities have been reported in Lotus Domino, which can be exploited by malicious people to conduct cross-site scripting attacks.

According to Secunia, input passed to the "BaseTarget" and "Src" parameters isn't properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerabilities, which Secunia's rating system ranks as "less critical," have been reported in version 6.5.2. Other versions may also be affected.

The vulnerability was first reported by IBM on Tuesday. On its Web site, IBM offers a solution and declares the vulnerability to be fixed. The solution consists of applying APAR LO07849 and LO07850.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: