| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.1 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic was found in Novell GroupWise 5.x/6. This issue affects some unknown processing of the component Client HTTP GET Handler. Such manipulation leads to missing encryption. The attack may be launched remotely. There is no exploit available. It is best to disable the affected component.
Details
A vulnerability was found in Novell GroupWise 5.x/6 (Groupware Software). It has been rated as critical. Affected by this issue is an unknown function of the component Client HTTP GET Handler. The manipulation with an unknown input leads to a missing encryption vulnerability. Using CWE to declare the problem leads to CWE-311. The product does not encrypt sensitive or critical information before storage or transmission. Impacted is confidentiality, and integrity.
The weakness was shared 08/04/2003 by Adam Gray (Website). The advisory is shared for download at support.novell.com. The attack may be launched remotely. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1600.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at support.novell.com.
The vulnerability is also documented in the databases at SecurityFocus (BID 9508†), OSVDB (2361†) and Secunia (SA9426†). The entry VDB-23030 is related to this item. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Support
Website
- Vendor: https://www.novell.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.1VulDB Meta Temp Score: 7.1
VulDB Base Score: 7.1
VulDB Temp Score: 7.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Missing encryptionCWE: CWE-311 / CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: DisableStatus: 🔍
0-Day Time: 🔍
Patch: support.novell.com
Timeline
08/04/2003 🔍08/04/2003 🔍
08/05/2003 🔍
01/27/2004 🔍
06/07/2017 🔍
Sources
Vendor: novell.comAdvisory: support.novell.com
Researcher: Adam Gray
Status: Not defined
GCVE (VulDB): GCVE-100-224
SecurityFocus: 9508 - Novell Groupwise Webaccess Cross Site Scripting Vulnerability
Secunia: 9426 - Novell Groupwise May Expose Usernames and Passwords, Not Critical
OSVDB: 2361 - Novell GroupWise HTTP GET Request Log File Authentication Credential Disclosure
SecuriTeam: securiteam.com
See also: 🔍
Entry
Created: 08/05/2003 13:11Updated: 06/07/2017 16:01
Changes: 08/05/2003 13:11 (59), 06/07/2017 16:01 (2)
Complete: 🔍
Cache ID: 216:4BD:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.

No comments yet. Languages: en.
Please log in to comment.