Novell Home

My Favorites

Close

Please to see your favorites.

Novell GroupWise WebAccess - Cross Site Scripting (XSS) Security Vulnerability via Unfiltered Style Expressions

This document (7003267) is provided subject to the disclaimer at the end of this document.

Environment

Novell GroupWise WebAccess
GroupWise 7.0 up to (and including) 7.03 HP2
GroupWise 8.0 up to (and including) 8.0.0 HP1

Situation

Novell GroupWise WebAccess is vulnerable to a cross-site scripting (XSS) exploit via unfiltered style expressions, which could potentially allow an attacker to send a message with an HTML file that contains malicious scripts, which could redirect a user and/or forward data & requests to a malicious site.

Credit: This vulnerability was discovered and reported by Jim LaValley - LaValley Consulting, LLC (http://www.lavalley.net).
Novell bug 472987, CVE-2009-1635.

Resolution

To resolve this issue:
For GroupWise 7.x systems, apply GroupWise 7.03 Hot Patch 3 (HP3) or later
For GroupWise 8.0 systems, apply GroupWise 8.0 Hot Patch 2 (HP2) or later
 

Status

Security Alert

Bug Number

472987

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7003267
  • Creation Date:14-MAY-09
  • Modified Date:27-APR-12
    • NovellGroupWise

Did this document solve your problem? Provide Feedback