ID OSVDB:13135 Type osvdb Reporter Marc Ruef(maru@scip.ch) Modified 2005-01-22T02:46:12
Description
Vulnerability Description
Novell GroupWise contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate login variables upon submission to the webacc script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Solution Description
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Customers that are concerned about the version information being made
public can edit login.htt and about.htt template files to remove this
information. These templates are located in the following
default locations:
Linux -
/var/opt/novell/gw/WEB-INF/classes/com/novell/webaccess/templates/frames
Windows -
C:\NOVELL\JAVA\SERVLETS\COM\NOVELL\WEBACCESS\TEMPLATES\FRAMES
Remove line 313 in login.htt and line 37 in about.htt.
Short Description
Novell GroupWise contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate login variables upon submission to the webacc script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
References:
Vendor URL: http://www.novell.com/
Security Tracker: 1012928
Related OSVDB ID: 13134
Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0606.html
Mail List Post: http://marc.theaimsgroup.com/?l=full-disclosure&m=110634060716097&w=2
{"title": "Novell GroupWise WebAccess Error Module Username XSS", "published": "2005-01-22T02:46:12", "references": [], "type": "osvdb", "enchantments": {"score": {"value": 4.3, "vector": "NONE"}, "dependencies": {"references": [], "modified": "2017-04-28T13:20:08"}, "vulnersScore": 4.3}, "cvelist": [], "viewCount": 0, "affectedSoftware": [{"version": "6.5.3", "name": "Groupwise", "operator": "eq"}], "hash": "b80211bf7985563584776220968ea9c751e2898fdd7fa6fe80f1814c95fe6d3b", "id": "OSVDB:13135", "modified": "2005-01-22T02:46:12", "history": [], "href": "https://vulners.com/osvdb/OSVDB:13135", "hashmap": [{"hash": "2a1234bb0fa4d9f34957de29e2590ebb", "key": "affectedSoftware"}, {"hash": "f9fa10ba956cacf91d7878861139efb9", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bc64311934b10ba13f06e35c67d9cdd8", "key": "description"}, {"hash": "53d1a064edd1b6b7c6c4fa406b2a4c8c", "key": "href"}, {"hash": "29137ac239662ac353a38356ecb40a22", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "29137ac239662ac353a38356ecb40a22", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "24b82fc2e1fb88696f62ab864901aa4c", "key": "reporter"}, {"hash": "fa8c7f96c2da0aff14c61f9647264227", "key": "title"}, {"hash": "1327ac71f7914948578f08c54f772b10", "key": "type"}], "objectVersion": "1.2", "edition": 1, "description": "## Vulnerability Description\nNovell GroupWise contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate login variables upon submission to the webacc script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Customers that are concerned about the version information being made \npublic can edit login.htt and about.htt template files to remove this \ninformation. These templates are located in the following \ndefault locations:\n \nNetWare - \nsys:\\tomcat\\webapps\\ROOT\\WEB-INF\\classes\\com\\novell\\webaccess\\templates\\frames\n \nLinux - \n/var/opt/novell/gw/WEB-INF/classes/com/novell/webaccess/templates/frames\n \nWindows - \nC:\\NOVELL\\JAVA\\SERVLETS\\COM\\NOVELL\\WEBACCESS\\TEMPLATES\\FRAMES\n \nRemove line 313 in login.htt and line 37 in about.htt.\n## Short Description\nNovell GroupWise contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate login variables upon submission to the webacc script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## References:\nVendor URL: http://www.novell.com/\nSecurity Tracker: 1012928\n[Related OSVDB ID: 13134](https://vulners.com/osvdb/OSVDB:13134)\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0606.html\nMail List Post: http://marc.theaimsgroup.com/?l=full-disclosure&m=110634060716097&w=2\n", "bulletinFamily": "software", "reporter": "Marc Ruef(maru@scip.ch)", "cvss": {"vector": "NONE", "score": 0.0}, "lastseen": "2017-04-28T13:20:08"}