The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[ISR] - Novell Groupwise WebAccess Cross-Site Scripting


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: Francisco Amato <famato@infobyte.com.ar.>
To: [email protected]
Subject: [ISR] - Novell Groupwise WebAccess Cross-Site Scripting
Date: Tue, 19 Jul 2005 09:46:55 -0300
Mime-Version: 1.0
Content-Type: text/plain; format=flowed; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru

||
|| [ISR]
|| Infobyte Security Research
|| www.infobyte.com.ar
|| 07.19.2005
|| 


.:: SUMMARY 

Novell Groupwise WebAccess Cross-Site Scripting 

Version: GroupWise 6.5 SP4, It is suspected that all previous versions of 
Groupwise WebAccess
are vulnerable. 

.:: BACKGROUND 

GroupWise WebAccess is Novell's premier Intranet/Internet GroupWare solution 
for the Web. 

More info:    http://www.novell.com 

.:: DESCRIPTION 

Remote explotation of Cross-Site Scripting due to failure of the application 
to properly
sanitize user-supplied input prior to including it in dynamically generated 
Web content. 

To reproduce this, send a e-mail with the following html code: 

<IMG SRC="j&#X41vascript:alert(document.cookie)"> 

It show a simple code of example to execute script in the browser of an 
unsuspecting user.
This issue may allow for the theft of authentication credentials. 

.:: VENDOR RESPONSE 

Vendor advisory:
   http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098301.htm 

Vendor patch:
   http://support.novell.com/filefinder/16963/beta.html
   The filename is fwa655d.exe

.:: CVE INFORMATION 

Id: CAN-2005-2276
Web: http://cve.mitre.org

.:: DISCLOSURE TIMELINE 

06/14/2005  Initial vendor notification
06/14/2005  Initial vendor response
07/19/2005  Coordinated public disclosure 

.:: CREDIT 

Francisco Amato is credited with discovering this vulnerability.
famato][at][infobyte][dot][com][dot][ar 

.:: LEGAL NOTICES 

Copyright (c) 2005 by [ISR] Infobyte Security Research.
Permission to redistribute this alert electronically is granted as long as 
it is not
edited in any way unless authorized by Infobyte Security Research Response.
Reprinting the whole or part of this alert in any medium other than 
electronically
requires permission from infobyte com ar 

Disclaimer
The information in the advisory is believed to be accurate at the time of 
publishing
based on currently available information. Use of the information constitutes 
acceptance
for use in an AS IS condition. There are no warranties with regard to this 
information.
Neither the author nor the publisher accepts any liability for any direct, 
indirect, or
consequential loss or damage arising from use of, or reliance on, this 
information. 



<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру