Vulnerabilities > CVE-2005-0296 - Unspecified vulnerability in Novell Groupwise and Groupwise Webaccess

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
novell
nessus

Summary

NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue

Nessus

NASL familyCGI abuses
NASL idGROUPWISE_AUTH_BYPASS.NASL
descriptionThe remote host is running Novell GroupWise WebAccess, a commercial groupware package. The remote version of this software is prone to an authentication bypass attack. An attacker requesting : /servlet/webacc?error=webacc may bypass the authentication mechanism and gain access to the groupware console.
last seen2020-06-01
modified2020-06-02
plugin id16183
published2005-01-17
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/16183
titleNovell GroupWise WebAccess Error Handler Authentication Bypass