First published: Thu Apr 20 2017(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the administrator console in Novell GroupWise before 2014 R2 Service Pack 1 Hot Patch 1 allow remote attackers to inject arbitrary web script or HTML via the (1) token parameter to gwadmin-console/install/login.jsp or (2) PATH_INFO to gwadmin-console/index.jsp.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus GroupWise | <=2012 | |
Micro Focus GroupWise | =2014 | |
Micro Focus GroupWise | =2014-r2 | |
Micro Focus GroupWise | =2014-sp1 | |
Micro Focus GroupWise | =2014-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2016-5760 vulnerability is classified with a severity that allows remote attackers to execute arbitrary web scripts or HTML in the administrator console.
To fix CVE-2016-5760, upgrade Novell GroupWise to version 2014 R2 Service Pack 1 Hot Patch 1 or later.
CVE-2016-5760 affects versions of Novell GroupWise prior to 2014 R2 Service Pack 1 Hot Patch 1, including versions 2012 and 2014.
CVE-2016-5760 can be exploited through cross-site scripting (XSS) attacks, allowing attackers to inject malicious scripts.
The vulnerable components in CVE-2016-5760 include gwadmin-console/install/login.jsp and the PATH_INFO parameter in the GroupWise administrator console.