First published: Mon Feb 02 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Novell GroupWise WebAccess 6.5x, 7.0, 7.01, 7.02x, 7.03, 7.03HP1a, and 8.0 allow remote attackers to inject arbitrary web script or HTML via the (1) User.id and (2) Library.queryText parameters to gw/webacc, and other vectors involving (3) HTML e-mail and (4) HTML attachments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus GroupWise | =7.0 | |
Micro Focus GroupWise | =7.02x | |
Micro Focus GroupWise | =8.0 | |
Micro Focus GroupWise | =7.01 | |
Micro Focus GroupWise | =6.5 | |
Micro Focus GroupWise | =7.03-hp1a | |
Micro Focus GroupWise | =7.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0273 is classified as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To mitigate CVE-2009-0273, users should update their Novell GroupWise to the latest version that addresses these cross-site scripting vulnerabilities.
CVE-2009-0273 affects Novell GroupWise versions 6.5, 7.0, 7.01, 7.02x, 7.03, 7.03HP1a, and 8.0.
CVE-2009-0273 can allow remote attackers to perform cross-site scripting (XSS) attacks, potentially injecting arbitrary web scripts or HTML.
Yes, CVE-2009-0273 remains a concern for users who are still using the affected versions without applying necessary updates.