Novell Home

My Favorites

Close

Please to see your favorites.

Security Vulnerability: Cross-Site Scripting (XSS issue) in GroupWise WebAccess

This document (7010768) is provided subject to the disclaimer at the end of this document.

Environment

GroupWise 8.0x up to and including 8.02HP3
GroupWise 2012

Situation

GroupWise WebAccess is vulnerable to a cross-site scripting (XSS) exploit where input passed via an HTML email is not properly sanitized before being displayed to the user, whereby an attacker could potentially insert arbitrary HTML and script code that will be executed in a user's browser session.

Resolution

To resolve this vulnerability, apply GroupWise 8.0 Support Pack 3 (or later), or GroupWise 2012 Support Pack 1.

Previous versions of GroupWise are likely also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their WebAccess servers and associated Domains to version 8.0 Support Pack 3 or 2012 SP1 in order to secure their system.

This vulnerability was discovered and reported by by Joshua Tiago, Cirosec via Secunia SVCRP (http://www.secunia.com/), Secunia advisory SA50623

Novell bugs 702788,745425, CVE-2012-4912

Status

Security Alert

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7010768
  • Creation Date:11-SEP-12
  • Modified Date:04-OCT-12
    • NovellGroupWise

Did this document solve your problem? Provide Feedback