The Java Console in IBM Domino 8.5.x allows remote authenticated users to hijack temporary credentials by leveraging knowledge of configuration details, aka SPR KLYH8TNNDN.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Lotus_domino | Ibm | 8.5.0 (including) | 8.5.0 (including) |
Lotus_domino | Ibm | 8.5.0.1 (including) | 8.5.0.1 (including) |
Lotus_domino | Ibm | 8.5.1 (including) | 8.5.1 (including) |
Lotus_domino | Ibm | 8.5.1.1 (including) | 8.5.1.1 (including) |
Lotus_domino | Ibm | 8.5.1.2 (including) | 8.5.1.2 (including) |
Lotus_domino | Ibm | 8.5.1.3 (including) | 8.5.1.3 (including) |
Lotus_domino | Ibm | 8.5.1.4 (including) | 8.5.1.4 (including) |
Lotus_domino | Ibm | 8.5.1.5 (including) | 8.5.1.5 (including) |
Lotus_domino | Ibm | 8.5.2.0 (including) | 8.5.2.0 (including) |
Lotus_domino | Ibm | 8.5.2.1 (including) | 8.5.2.1 (including) |
Lotus_domino | Ibm | 8.5.2.2 (including) | 8.5.2.2 (including) |
Lotus_domino | Ibm | 8.5.2.3 (including) | 8.5.2.3 (including) |
Lotus_domino | Ibm | 8.5.2.4 (including) | 8.5.2.4 (including) |
Lotus_domino | Ibm | 8.5.3.0 (including) | 8.5.3.0 (including) |
Lotus_domino | Ibm | 8.5.3.1 (including) | 8.5.3.1 (including) |
Lotus_domino | Ibm | 8.5.3.2 (including) | 8.5.3.2 (including) |