Korean
<< Back
VID 21291
Severity 30
Port 80, ...
Protocol TCP
Class Servlet
Detailed Description The WebAcc Servlet in the Novell GroupWise server is vulnerable to a directory traversal vulnerability. Novell GroupWise is a cross-platform collaboration and messaging system. The /servlet/webacc servlet in Novell GroupWise versions 5.5 and 6 could a remote attacker to view the contents of arbitrary webserver file, caused by improper validation of user-supplied "User.html" parameter. To exploit this vulnerability, a remote attacker will send a "/servlet/webacc" request containing "dot dot" sequences (/../) and a known file appended with a NULL byte character (%00) as the following:

http://[targetserver]//servlet/webacc?User.html=../../../../../../../../../../boot.ini

It can allow a remote attacker to view the requested file.

* References:
http://www.kb.cert.org/vuls/id/341539
http://www.foundstone.com/knowledge/randd-advisories-display.html?id=327
http://www.securiteam.com/securitynews/6S00N0K2UM.html

* Platforms Affected:
Novell GroupWise 5.5 Enhancement Pack
Novell GroupWise 6.0
Recommendation Apply the appropriate patch for this vulnerability, as listed in Novell Technical Information Document 2960443 at http://www.novell.com/coolsolutions/gwmag/features/a_webaccess_security_gw.html
Related URL CVE-2001-1458 (CVE)
Related URL 3436 (SecurityFocus)
Related URL 7287 (ISS)