We are recently running a vulnerability scan on our network and one of the vulnerability detected was one Domino web site. The exact security alert is:
“Access to the ReadDesign method over HTTP should be restricted to only trusted hosts.”
So I’d like to block the ReadDesign method over HTTP, any idea how I can realize that and get rid of that vulnerability?
The only solution I know is to create a redirection document on your domino HTTP server which will redirect every incoming URL ReadDesign to an url that does not exist like /ThisDoesNotExists .
You can do this also for all the URL predefined command you don’t want to expose (like ?deletedocument).
Honestly I don’t remember if it worked or not in R6. I’m only running V7/V8 server, so I cannot try it on a V6 server…
The only thing I can tell you is that it works on v7.
But in my opinion, you don’t risk much in adding this rule on your V6 server. If it doesn’t work it won’t break anything either as they stated in the other mail this doesn’t work means for means the redirection does not happen!
I implemented the URL redirect with no problem, but now when using Domino Web Access users can no longer access anything but the inbox for mail. Any other mail folder returns an error. Has anyone else had this and how did you fix?