header-logo
Suggest Exploit
vendor:
eGroupWare
by:
Unknown
7.5
CVSS
HIGH
Cross-Site Scripting, HTML Injection
79
CWE
Product Name: eGroupWare
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: a:egroupware:egroupware
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

eGroupWare Multiple Cross-Site Scripting and HTML Injection Vulnerabilities

eGroupWare is susceptible to multiple cross-site scripting and HTML injection vulnerabilities. The cross-site scripting issues exist in the 'addressbook' and 'calendar' modules, as well as in the 'Search' functionality of the 'addressbook', 'calendar', and 'search between projects' modules. The HTML injection vulnerabilities are present in the 'Messenger' and 'Ticket' modules. These vulnerabilities can be exploited by attackers to steal cookie-based authentication credentials and manipulate web content.

Mitigation:

It is recommended to sanitize user input and implement proper input validation to prevent cross-site scripting and HTML injection attacks. Regular security updates and patches should be applied to address these vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11013/info

It is reported that eGroupWare is susceptible to multiple cross-site scripting and HTML injection vulnerabilities.

The cross-site scripting issues present themselves in the various parameters of the 'addressbook' and 'calendar' modules. It is also reported that data input through the 'Search' fields of the 'addressbook', 'calendar', and 'search between projects' functionality are not sufficiently sanitized.

An attacker can exploit these issues for theft of cookie-based authentication credentials and other attacks.

Additionally HTML injection vulnerabilities are reported for the eGroupWare 'Messenger' module and 'Ticket' module.

Attackers may potentially exploit these issues to manipulate web content or to steal cookie-based authentication credentials. It may be possible to take arbitrary actions as the victim user.

http://www.example.com/egroupware/index.php?menuaction=calendar.uicalendar.day&date=20040701"><script>alert(document.cookie)</script