GroupWise WebAccess < 6.5 SP5 EMail IMG SRC XSS

low Nessus Network Monitor Plugin ID 3087

Synopsis

The remote host is vulnerable to a Cross-Site Scripting (XSS) attack.

Description

The remote host is running a version of GroupWise WebAccess from Novell that fails to sanitize email messages of HTML and script code embedded in IMG tags. An attacker can exploit this flaw to launch cross-site scripting attacks against users of WebAccess by sending them specially crafted email messages.

Solution

Upgrade to version 6.5 SP5 or higher.

See Also

http://www.infobyte.com.ar/adv/ISR-11.html

http://archives.neohapsis.com/archives/bugtraq/2005-07/0322.html

http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098301.htm

http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098301.ht

Plugin Details

Severity: Low

ID: 3087

Family: CGI

Published: 7/20/2005

Updated: 3/6/2019

Nessus ID: 19228

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:novell:groupwise_webaccess

Reference Information

CVE: CVE-2005-2276

BID: 14310