Advisory Details

July 20th, 2010

Novell Groupwise WebAccess Multiple Cross-Site Scripting Vulnerabilities

ZDI-10-135
ZDI-CAN-710

CVE ID CVE-2010-2778, CVE-2010-2779
CVSS SCORE 4.3, AV:N/AC:M/Au:N/C:P/I:N/A:N
AFFECTED VENDORS Novell
AFFECTED PRODUCTS GroupWise WebAccess
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['10036']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary client side script
on vulnerable installations of Novell Groupwise WebAccess. Authentication is not
required to exploit this vulnerability.

The specific flaw exists within handling html messages sent to a Novell Groupwise
WebAccess user. Messages are improperly sanitized allowing client side script to
be supplied to the user's web browser resulting in the user's WebAccess credentials
being compromised.

ADDITIONAL DETAILS

http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=7006375&sliceId=2&docTypeID=DT_TID_1_1&dialogID=155271273&stateId=0%200%20155267615

http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7006376&sliceId=2&docTypeID=DT_TID_1_1&dialogID=155271386&stateId=0%200%20155267712


DISCLOSURE TIMELINE
  • 2010-04-05 - Vulnerability reported to vendor
  • 2010-07-20 - Coordinated public release of advisory
CREDIT scriptjunkie scriptjunkie1 {nospam} googlemail {nospam} com
BACK TO ADVISORIES