CERTA-2008-AVI-335
Vulnerability from certfr_avis

Une vulnérabilité de type injection de code indirecte affecte Novell GroupWise.

Description

Une vulnérabilité a été identifiée dans l'interface simple de WebAccess dans Novell GroupWise. Certains paramètres non spécifiés ne seraient pas assez filtrés, ce qui permettrait à une personne malintentionnée d'effectuer des injections de code indirecte. L'interface standard de WebAccess n'est pas affectée.

Solution

Se référer aux bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Novell GroupWise 7.0.x

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003e\u003cTT\u003eNovell GroupWise 7.0.x\u003c/TT\u003e\u003c/P\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 identifi\u00e9e dans l\u0027interface simple de WebAccess\ndans Novell GroupWise. Certains param\u00e8tres non sp\u00e9cifi\u00e9s ne seraient pas\nassez filtr\u00e9s, ce qui permettrait \u00e0 une personne malintentionn\u00e9e\nd\u0027effectuer des injections de code indirecte. L\u0027interface standard de\nWebAccess n\u0027est pas affect\u00e9e.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2008-06-25T00:00:00",
  "last_revision_date": "2008-06-25T00:00:00",
  "links": [
    {
      "title": "Notes de la mise \u00e0 jour de GroupWise du 18 juin 2008    (Windows) :",
      "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5028200.html"
    },
    {
      "title": "Notes de la mise \u00e0 jour de GroupWise du 19 juin 2008    (Linux) :",
      "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5028303.html"
    }
  ],
  "reference": "CERTA-2008-AVI-335",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-06-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 de type injection de code indirecte affecte Novell\nGroupWise.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Novell GroupWise",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Notes de mises \u00e0 jour GroupWise du 18 et 19 juin 2008",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…