Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Novell GroupWise WebAccess Authentication Bypass


Vulnerability Assessment Details

Novell GroupWise WebAccess Authentication Bypass

Vulnerability Assessment Summary
Checks GroupWare Auth Bypass

Detailed Explanation for this Vulnerability Assessment

The remote host is running Novell GroupWise WebAccess, a commercial
commercial groupware package.

The remote version of this software is vulnerable to an authentication
bypass vulnerability.

A possible hacker requesting :

/servlet/webacc?error=webacc

may bypass the authentication mechanism and gain access to the groupware
console.

Solution : None at this time
Network Security Threat Level: Medium

Networks Security ID: 12285

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Lenovo Intel Xeon E5-2440 v2 Octa-core (8 Core) 1.90 GHz Processor Upgrade - 20
$324.53
Lenovo Intel Xeon E5-2440 v2 Octa-core (8 Core) 1.90 GHz Processor Upgrade - 20  picture2.0GHz Intel SR1H0 Xeon E7-4820 v2 8 Cores FCLGA2011 16MB Cache Processor
$67.41
2.0GHz Intel SR1H0 Xeon E7-4820 v2 8 Cores FCLGA2011 16MB Cache Processor picture3.5GHz Intel SR151 Xeon E3-1270v3 4 Cores FCLGA1150 8MB Cache Processor
$188.33
3.5GHz Intel SR151 Xeon E3-1270v3 4 Cores FCLGA1150 8MB Cache Processor picture2.0GHz Intel Xeon E7-4820 v2 8 Cores FCLGA2011 16MB Cache Processor CM8063601521
$67.41
2.0GHz Intel Xeon E7-4820 v2 8 Cores FCLGA2011 16MB Cache Processor CM8063601521 picture


Discussions

No Discussions have been posted on this vulnerability.