CERTA-2008-AVI-335
Vulnerability from certfr_avis - Published: 2008-06-25 - Updated: 2008-06-25
Une vulnérabilité de type injection de code indirecte affecte Novell GroupWise.
Description
Une vulnérabilité a été identifiée dans l'interface simple de WebAccess dans Novell GroupWise. Certains paramètres non spécifiés ne seraient pas assez filtrés, ce qui permettrait à une personne malintentionnée d'effectuer des injections de code indirecte. L'interface standard de WebAccess n'est pas affectée.
Solution
Se référer aux bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Novell GroupWise 7.0.x
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cTT\u003eNovell GroupWise 7.0.x\u003c/TT\u003e\u003c/P\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 identifi\u00e9e dans l\u0027interface simple de WebAccess\ndans Novell GroupWise. Certains param\u00e8tres non sp\u00e9cifi\u00e9s ne seraient pas\nassez filtr\u00e9s, ce qui permettrait \u00e0 une personne malintentionn\u00e9e\nd\u0027effectuer des injections de code indirecte. L\u0027interface standard de\nWebAccess n\u0027est pas affect\u00e9e.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2008-06-25T00:00:00",
"last_revision_date": "2008-06-25T00:00:00",
"links": [
{
"title": "Notes de la mise \u00e0 jour de GroupWise du 18 juin 2008 (Windows) :",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5028200.html"
},
{
"title": "Notes de la mise \u00e0 jour de GroupWise du 19 juin 2008 (Linux) :",
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5028303.html"
}
],
"reference": "CERTA-2008-AVI-335",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-06-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 de type injection de code indirecte affecte Novell\nGroupWise.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Novell GroupWise",
"vendor_advisories": [
{
"published_at": null,
"title": "Notes de mises \u00e0 jour GroupWise du 18 et 19 juin 2008",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…