lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050719124655.30264.qmail@microvac.ferengi.com.ar>
Date: Tue Jul 19 13:42:36 2005
From: famato at infobyte.com.ar (Francisco Amato)
Subject: [ISR] - Novell Groupwise WebAccess Cross-Site
	Scripting

||
|| [ISR]
|| Infobyte Security Research
|| www.infobyte.com.ar
|| 07.19.2005
|| 


.:: SUMMARY 

Novell Groupwise WebAccess Cross-Site Scripting 

Version: GroupWise 6.5 SP4, It is suspected that all previous versions of 
Groupwise WebAccess
are vulnerable. 

.:: BACKGROUND 

GroupWise WebAccess is Novell's premier Intranet/Internet GroupWare solution 
for the Web. 

More info:    http://www.novell.com 

.:: DESCRIPTION 

Remote explotation of Cross-Site Scripting due to failure of the application 
to properly
sanitize user-supplied input prior to including it in dynamically generated 
Web content. 

To reproduce this, send a e-mail with the following html code: 

<IMG SRC="j&#X41vascript:alert(document.cookie)"> 

It show a simple code of example to execute script in the browser of an 
unsuspecting user.
This issue may allow for the theft of authentication credentials. 

.:: VENDOR RESPONSE 

Vendor advisory:
   http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098301.htm 

Vendor patch:
   http://support.novell.com/filefinder/16963/beta.html
   The filename is fwa655d.exe

.:: CVE INFORMATION 

Id: CAN-2005-2276
Web: http://cve.mitre.org

.:: DISCLOSURE TIMELINE 

06/14/2005  Initial vendor notification
06/14/2005  Initial vendor response
07/19/2005  Coordinated public disclosure 

.:: CREDIT 

Francisco Amato is credited with discovering this vulnerability.
famato][at][infobyte][dot][com][dot][ar 

.:: LEGAL NOTICES 

Copyright (c) 2005 by [ISR] Infobyte Security Research.
Permission to redistribute this alert electronically is granted as long as 
it is not
edited in any way unless authorized by Infobyte Security Research Response.
Reprinting the whole or part of this alert in any medium other than 
electronically
requires permission from infobyte com ar 

Disclaimer
The information in the advisory is believed to be accurate at the time of 
publishing
based on currently available information. Use of the information constitutes 
acceptance
for use in an AS IS condition. There are no warranties with regard to this 
information.
Neither the author nor the publisher accepts any liability for any direct, 
indirect, or
consequential loss or damage arising from use of, or reliance on, this 
information. 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ