First published: Fri Dec 16 2022(Updated: )
A vulnerability has been identified in Micro Focus GroupWise Web in versions prior to 18.4.2. The GW Web component makes a request to the Post Office Agent that contains sensitive information in the query parameters that could be logged by any intervening HTTP proxies.
Credit: security@microfocus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Groupwise | <18.4.2 |
Micro Focus has made the following mitigation information available to resolve the vulnerability for the impacted versions of Micro Focus GroupWise: Please update to Micro Focus GroupWise 18.4.2 or newer
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38756 is a vulnerability identified in Micro Focus GroupWise Web in versions prior to 18.4.2.
The severity of CVE-2022-38756 is medium, with a CVSSv3 score of 4.3.
CVE-2022-38756 affects Micro Focus GroupWise Web in versions prior to 18.4.2.
To fix CVE-2022-38756, upgrade Micro Focus GroupWise Web to version 18.4.2 or later.
Yes, here are some references for CVE-2022-38756: [Link 1](http://packetstormsecurity.com/files/170768/Micro-Focus-GroupWise-Session-ID-Disclosure.html), [Link 2](http://seclists.org/fulldisclosure/2023/Jan/28), [Link 3](https://portal.microfocus.com/s/article/KM000012374?language=en_US).