Juniper ScreenOS 6.3.x < 6.3.0r24 Multiple XSS (JSA10782)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple cross-site scripting
vulnerabilities.

Description :

The version of Juniper ScreenOS running on the remote host is 6.3.x
prior to 6.3.0r24. It is, therefore, affected by multiple cross-site
scripting (XSS) vulnerabilities in the web user interface due to
improper validation of user-supplied input before returning it to
users. An authenticated, remote attacker who has a 'security' role can
exploit this issue to inject HTML or JavaScript into the management
session of other users, including the administrator.

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10782
http://www.nessus.org/u?c4eb1929

Solution :

Upgrade to Juniper ScreenOS version 6.3.0r24 or later. Alternatively,
apply the workaround referenced in the vendor's advisory.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)
CVSS Temporal Score : 2.9
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 101840 ()

Bugtraq ID: 99590

CVE ID: CVE-2017-2335
CVE-2017-2336
CVE-2017-2337
CVE-2017-2338
CVE-2017-2339

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now