Description
The WebAccess component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 does not properly implement session management mechanisms, which allows remote attackers to gain access to user accounts via unspecified vectors.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Gregory Duchemin · textremotemultiple
https://www.exploit-db.com/exploits/33007
References (6)
Core 6
Core References
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/1393
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/35177
Vendor Advisory x_refsource_confirm
http://www.novell.com/support/viewContent.do?externalId=7003266&sliceId=1
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/35066
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/50688
Vendor Advisory x_refsource_misc
https://bugzilla.novell.com/show_bug.cgi?id=472979
Scores
EPSS
0.0494
EPSS Percentile
89.7%
Details
Status
published
Products (6)
novell/groupwise
7.0
novell/groupwise
7.0.0 sp1 (2 CPE variants)
novell/groupwise
7.0.2
novell/groupwise
7.0.3
novell/groupwise
7.03 hp1a (2 CPE variants)
novell/groupwise
8.0 (2 CPE variants)
Published
May 26, 2009
Tracked Since
Feb 18, 2026