Novell GroupWise < 7.03HP2 / 8.0HP1 WebAccess Multiple XSS

This script is Copyright (C) 2009-2012 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a script that is prone to a cross-site
scripting attack.

Description :

The version of Novell GroupWise WebAccess installed on the remote host
fails to sanitize user-supplied input via a POST request to the
'User.id' parameter of the '/gw/webacc' script before using it to
generate dynamic HTML output. An attacker may be able to leverage
this issue to inject arbitrary HTML and script code into a user's
browser to be executed within the security context of the affected
site.

Note that this install is also likely affected by other cross-site
scripting and cross-site request forgery issues in its WebAccess
component as well as a buffer overflow in its GWIA component, although
Nessus has not checked for them.

See also :

http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23
http://www.securityfocus.com/archive/1/500575/30/0/threaded
http://www.novell.com/support/viewContent.do?externalId=7002321

Solution :

Apply GroupWise 7.03 Hot Patch 2 (HP2) or GroupWise 8.0 Hot Patch 1
(HP1) or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 35726 (groupwise_webaccess_userid_xss.nasl)

Bugtraq ID: 33541

CVE ID: CVE-2009-0273