Korean
<< Back
VID 21466
Severity 30
Port 80, ...
Protocol TCP
Class Servlet
Detailed Description The Novell GroupWise WebAccess is vulnerable to an authentication bypass vulnerability. GroupWise is the commercial groupware package distributed and maintained by Novell. Novell GroupWise WebAccess could allow a remote attacker to bypass authentication and gain unauthorized access to the program, by accessing the 'webacc' servlet and providing unsuspected parameter data. When an authentication attempt fails, the affected servlet invokes an error page that is passed through the 'error' URI parameter. If this parameter is given the value 'webacc', authentication will be bypassed and the attacker will gain access to the affected Web application.

* References:
http://www.securityfocus.com/archive/1/387566

* Platforms Affected:
Novell, Inc., Novell GroupWise WebAccess Any version
Novell, Inc., Novell NetWare Any version
Microsoft Windows Any version
Novell NetWare Any version
Linux Any version
Recommendation No upgrade or patch available as of June 2014.

As a workaround, Novell reports that customers who are concerned about product version information being leaked may edit 'login.htt' and 'about.htt' template files to remove this information. This may be accomplished by removing line 313 from 'login.htt' and line 37 from 'about.htt'. Further information can be found in the advisory at http://www.securityfocus.com/advisories/7881
Related URL (CVE)
Related URL 12285 (SecurityFocus)
Related URL 18954 (ISS)