Multiple cross-site scripting (XSS) vulnerabilities in the administrator console in Novell GroupWise before 2014 R2 Service Pack 1 Hot Patch 1 allow remote attackers to inject arbitrary web script or HTML via the (1) token parameter to gwadmin-console/install/login.jsp or (2) PATH_INFO to gwadmin-console/index.jsp.
References
Link | Resource |
---|---|
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt | Exploit Third Party Advisory VDB Entry |
https://www.novell.com/support/kb/doc.php?id=7017973 | Vendor Advisory |
http://www.securityfocus.com/bid/92646 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2016/Aug/123 | Mailing List Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/539296/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-04-20 10:59
Updated : 2019-05-30 08:08
NVD link : CVE-2016-5760
Mitre link : CVE-2016-5760
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
novell
- groupwise