[原文]Cross-site scripting (XSS) vulnerability in Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to process arbitrary script or HTML as other users via (1) a malformed request for a Perl program with script in the filename, (2) the User.id parameter to the webacc servlet, (3) the GWAP.version parameter to webacc, or (4) a URL request for a .bas file with script in the filename.
Novell NetWare Enterprise Web Server webacc Multiple Parameter XSS
Remote / Network Access
Loss of Integrity
Novell NetWare Enterprise Web Server / GroupWise contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'User.id' or 'GWAP.version' variables upon submission to the 'webacc' utility. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Upgrade to version CSP 8 for 5.1, CSP 5 for 6.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.