Novell GroupWise WebAccess 和Novell GroupWise WebAccess 跨站脚本攻击(XSS)漏洞

漏洞信息详情

Novell GroupWise WebAccess 和Novell GroupWise WebAccess 跨站脚本攻击(XSS)漏洞

漏洞简介

20060727之前的Novell GroupWise WebAccess 6.5和Novell GroupWise WebAccess 7版本中具有跨站脚本攻击(XSS)漏洞,远程攻击者可借助带有UTF-7字符集的邮件消息中的编码SCRIPT元素来注入任意web脚本或HTML,如通过\”+ADw-SCRIPT+AD4-\”序列。

漏洞公告

参考网址

来源: XF

名称: groupwise-utf7-xss(28211)

链接:http://xforce.iss.net/xforce/xfdb/28211

来源: www.novell.com

链接:http://www.novell.com/support/search.do?cmd=displayKC&externalId=3701584&sliceId=SAL_Public

来源: MISC

链接:http://www.infobyte.com.ar/adv/ISR-14.html

来源: VUPEN

名称: ADV-2006-3098

链接:http://www.frsirt.com/english/advisories/2006/3098

来源: support.novell.com

链接:http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974176.htm

来源: SECUNIA

名称: 21411

链接:http://secunia.com/advisories/21411

来源: FULLDISC

名称: 20060808 [ISR] – Novell Groupwise Webaccess (Cross-Site Scripting)

链接:http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048593.html

来源: BID

名称: 19297

链接:http://www.securityfocus.com/bid/19297

来源: BUGTRAQ

名称: 20060808 [ISR] – Novell Groupwise Webaccess (Cross-Site Scripting)

链接:http://www.securityfocus.com/archive/1/archive/1/442719/100/100/threaded

来源: SECTRACK

名称: 1016648

链接:http://securitytracker.com/id?1016648

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享