Computer Security
[EN] securityvulns.ru no-pyccku


Novell GroupWise WebAccess crossite scripting
updated since 01.02.2009
Published:29.05.2009
Source:
SecurityVulns ID:9641
Type:remote
Threat Level:
5/10
Description:Multiple crossite scripting and request forgery vulnerabilities.
Affected:NOVELL : GroupWise WebAccess 7.0
CVE:CVE-2009-1635 (Multiple cross-site scripting (XSS) vulnerabilities in the WebAccess component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to inject arbitrary web script or HTML via (1) the User.lang parameter to the login page (aka gw/webacc), (2) style expressions in a message that contains an HTML file, or (3) vectors associated with incorrect protection mechanisms against scripting, as demonstrated using whitespace between JavaScript event names and values.)
 CVE-2009-0273 (Multiple cross-site scripting (XSS) vulnerabilities in Novell GroupWise WebAccess 6.5x, 7.0, 7.01, 7.02x, 7.03, 7.03HP1a, and 8.0 allow remote attackers to inject arbitrary web script or HTML via the (1) User.id and (2) Library.queryText parameters to gw/webacc, and other vectors involving (3) HTML e-mail and (4) HTML attachments.)
 CVE-2009-0272 (Cross-site request forgery (CSRF) vulnerability in Novell GroupWise WebAccess 6.5x, 7.0, 7.01, 7.02x, 7.03, 7.03HP1a, and 8.0 allows remote attackers to insert e-mail forwarding rules, and modify unspecified other configuration settings, as arbitrary users via unknown vectors.)
Original documentdocumentc3rb3r_(at)_videotron.ca, Novell Groupwise fails to properly sanitize emails. (29.05.2009)
 documentProCheckUp Research, PR08-21: Cross-site Request Forgery (CSRF) on Novell GroupWise WebAccess allows email theft and other attacks (01.02.2009)
 documentProCheckUp Research, PR08-22: Persistent XSS on Novell GroupWise WebAccess (01.02.2009)
 documentProCheckUp Research, PR08-23: XSS on Novell GroupWise WebAccess (01.02.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod