Novell is now a part of Micro Focus

My Favorites


Please to see your favorites.

Persistent XSS in GroupWise WebAccess Message View

This document (7017974) is provided subject to the disclaimer at the end of this document.


Novell GroupWise 2014 R2
Novell GroupWise 2014
Previous versions of GroupWise are potentially also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their WebAccess servers and associated Domains to version 2014 R2 SP1 HP1 in order to secure their system.


A vulnerability exists in the GroupWise WebAccess message viewer that may allow an attacker to execute javascript in the context of an authenticated user by getting the user to interact with a malicious mail message sent by the attacker. This could lead to session compromise or enable other browser based attacks.


To resolve this vulnerability, update GroupWise WebAccess to 2014 R2 SP1 HP1 (or later).
This vulnerability was discovered and reported by Wolfgang Ettlinger working with SEC Consult
Novell bug 987682, CVE-2016-5761


Security Alert

Bug Number



This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7017974
  • Creation Date:23-AUG-16
  • Modified Date:24-AUG-16
    • NovellGroupWise

Did this document solve your problem? Provide Feedback