Vulnerabilities > CVE-2005-2276 - HTML Injection vulnerability in Novell Groupwise Webaccess 6.0/6.5

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
novell
nessus
exploit available

Summary

Cross-site scripting (XSS) vulnerability in Novell Groupwise WebAccess 6.5 before July 11, 2005 allows remote attackers to inject arbitrary web script or HTML via an e-mail message with an encoded javascript URI (e.g. "j&#X41vascript" in an IMG tag.

Vulnerable Configurations

Part Description Count
Application
Novell
6

Exploit-Db

descriptionNovell GroupWise 6.5 WebAccess HTML Injection Vulnerability. CVE-2005-2276 . Webapps exploit for java platform
idEDB-ID:26001
last seen2016-02-03
modified2005-07-15
published2005-07-15
reporterFrancisco Amato
sourcehttps://www.exploit-db.com/download/26001/
titleNovell GroupWise 6.5 WebAccess HTML Injection Vulnerability

Nessus

  • NASL familyCGI abuses : XSS
    NASL idGROUPWISE_WEBACCESS_XSS.NASL
    descriptionThe remote host is running a version of GroupWise WebAccess from Novell that fails to sanitize email messages of HTML and script code embedded in IMG tags. An attacker can exploit this flaw to launch cross-site scripting attacks against users of WebAccess by sending them specially crafted email messages.
    last seen2020-06-01
    modified2020-06-02
    plugin id19228
    published2005-07-20
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19228
    titleNovell GroupWise WebAccess Email IMG SRC XSS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19228);
      script_version("1.23");
      script_cvs_date("Date: 2018/11/15 20:50:19");
    
      script_cve_id("CVE-2005-2276");
      script_bugtraq_id(14310);
    
      script_name(english:"Novell GroupWise WebAccess Email IMG SRC XSS");
      script_summary(english:"Checks for cross-site scripting vulnerability in GroupWise WebAccess");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote web server contains a script that is affected by a cross-
    site scripting issue.");
      script_set_attribute(attribute:"description", value:
    "The remote host is running a version of GroupWise WebAccess from
    Novell that fails to sanitize email messages of HTML and script code
    embedded in IMG tags. An attacker can exploit this flaw to launch
    cross-site scripting attacks against users of WebAccess by sending
    them specially crafted email messages.");
      # https://web.archive.org/web/20060207021932/http://www.infobyte.com.ar/adv/ISR-11.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b5e9b54a");
      script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/Jul/320");
      script_set_attribute(attribute:"see_also", value:"http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098301.htm");
      script_set_attribute(attribute:"solution", value:"Upgrade to GroupWise 6.5 SP5 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2005/07/15");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/07/20");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:novell:groupwise_webaccess");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"CGI abuses : XSS");
    
      script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
    
      script_dependencies("http_version.nasl");
      script_exclude_keys("Settings/disable_cgi_scanning");
      script_require_keys("Settings/ParanoidReport");
      script_require_ports("Services/www", 80);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    port = get_http_port(default:80);
    
    # The aboutpqa.htm associated with the Palm app often has more detailed info
    # but isn't necessarily upgraded so check only if Report Paranoia is
    # set to Paranoid.
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    w = http_send_recv3(method:"GET", item:"/com/novell/webaccess/palm/en/aboutpqa.htm", port:port);
    if (isnull(w)) exit(1, "the web server did not answer");
    res = w[2];
    # nb: looks like:
    #     <BR>Program Release:
    #     <BR>6.5.4
    if ("<BR>Program Release:" >< res) {
      res = strstr(res, "Program Release:");
      pat = "^<BR>([0-9].+)$";
      if (egrep(string:res, pattern:pat, icase:TRUE)) {
        matches = egrep(pattern:pat, string:res, icase:TRUE);
        foreach match (split(matches)) {
          match = chomp(match);
          ver = eregmatch(pattern:pat, string:match);
          if (!isnull(ver)) {
            ver = ver[1];
            break;
          }
        }
      }
    }
    
    # If that failed, try to get it from WebAccess' main page.
    if (isnull(ver)) {
      w = http_send_recv3(method:"GET", item:"/servlet/webacc", port:port);
      if (isnull(w)) exit(1, "the web server did not answer");
      res = w[2];
    
      # Look for the version number in the banner.
      pat = "^<BR>Version ([0-9].+)";
      if (egrep(string:res, pattern:pat, icase:TRUE)) {
        matches = egrep(pattern:pat, string:res, icase:TRUE);
        foreach match (split(matches)) {
          match = chomp(match);
          ver = eregmatch(pattern:pat, string:match);
          if (!isnull(ver)) {
            ver = ver[1];
            # nb: 6.5 by itself doesn't give us enough details.
            if (ver =~ "^6\.5$") {
              ver = NULL;
            }
            break;
          }
        }
      }
    }
    
    # Versions 6.5.4 and below are affected.
    if (ver && ver =~ "^([0-5]\.|6\.([0-4]|5\.[0-4]))") {
      security_warning(port);
      set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
      exit(0);
    }
    
  • NASL familyCGI abuses : XSS
    NASL idTORTURE_CGI_CROSS_SITE_SCRIPTING2.NASL
    descriptionThe remote web server hosts CGI scripts that fail to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user
    last seen2020-06-01
    modified2020-06-02
    plugin id47831
    published2010-07-26
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47831
    titleCGI Generic XSS (comprehensive test)