Basic search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:20651
HistoryOct 03, 2008 - 12:00 a.m.

Layered Defense Research Advisory: Juniper Netscreen Firewall Cross-Site-Scripting (XSS) event log injection

2008-10-0300:00:00
vulners.com
16

==================================================
Layered Defense Research Advisory 1 October 2008

1) Affected Product
Juniper Netscreen Firewall
ScreenOS version 5.4.0r9.0

2) Severity Rating:
Low - Moderate
Impact: Potential system compromises but requires user interaction.

3) Description of Vulnerability
A Cross-Site Scripting (XSS) Injection vulnerability was discovered within the Juniper Netscreen
firewall NetOS version 5.4.0r9.0. The vulnerability is caused by failure to validate input from the
web interface login, and telnet session login. This makes it possible for an attacker to inject
javascript as part of the user name during login. The javascript is then stored in the device event
logs. When the event logs are viewed within the Netscreen web console the javascript is executed. A
successful attack would allow an attacker to run JavaScript on the computer system connecting to the
netscreen web management console which could lead to system compromise.

4) Solution
Upgrade to ScreenOS versions 5.4r10, 6.0r6, 6.1r2, and later. If unsure if your product is vulnerable
it is recommended that you contact the vendor.

5) Time Table:
04/07/2008 Reported Vulnerability to Vendor.
04/23/2008 Vendor acknowledged the vulnerability
10/01/2008 Vendor advisory published

6) Credits Discovered by Deral Heiland, www.LayeredDefense.com

7) Reference
https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-009&viewMode=view

8) About Layered Defense Layered Defense, Is a group of security professionals that work together on
ethical Research,
Testing and Training within the information security arena. http://www.layereddefense.com