Novell GroupWise WebAccess Error Module Username XSS

2005-01-22T02:46:12
ID OSVDB:13135
Type osvdb
Reporter Marc Ruef(maru@scip.ch)
Modified 2005-01-22T02:46:12

Description

Vulnerability Description

Novell GroupWise contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate login variables upon submission to the webacc script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Customers that are concerned about the version information being made public can edit login.htt and about.htt template files to remove this information. These templates are located in the following default locations:

NetWare - sys:\tomcat\webapps\ROOT\WEB-INF\classes\com\novell\webaccess\templates\frames

Linux - /var/opt/novell/gw/WEB-INF/classes/com/novell/webaccess/templates/frames

Windows - C:\NOVELL\JAVA\SERVLETS\COM\NOVELL\WEBACCESS\TEMPLATES\FRAMES

Remove line 313 in login.htt and line 37 in about.htt.

Short Description

Novell GroupWise contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate login variables upon submission to the webacc script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.novell.com/ Security Tracker: 1012928 Related OSVDB ID: 13134 Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0606.html Mail List Post: http://marc.theaimsgroup.com/?l=full-disclosure&m=110634060716097&w=2