Environment
GroupWise 8.0x up to and including 8.02HP3
GroupWise 2012
GroupWise 2012
Situation
GroupWise WebAccess is vulnerable to a cross-site scripting (XSS) exploit where input passed via an HTML email is not properly sanitized before being displayed to the user, whereby an attacker could potentially insert arbitrary HTML and script code that will be executed in a user's browser session.
Resolution
To resolve this vulnerability, apply GroupWise 8.0 Support Pack 3 (or later), or GroupWise 2012 Support Pack 1.
Previous versions of GroupWise are likely also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their WebAccess servers and associated Domains to version 8.0 Support Pack 3 or 2012 SP1 in order to secure their system.
This vulnerability was discovered and reported by by Joshua Tiago, Cirosec via Secunia SVCRP (http://www.secunia.com/), Secunia advisory SA50623
Novell bugs 702788,745425, CVE-2012-4912
Previous versions of GroupWise are likely also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their WebAccess servers and associated Domains to version 8.0 Support Pack 3 or 2012 SP1 in order to secure their system.
This vulnerability was discovered and reported by by Joshua Tiago, Cirosec via Secunia SVCRP (http://www.secunia.com/), Secunia advisory SA50623
Novell bugs 702788,745425, CVE-2012-4912