ID

VAR-200607-0333


CVE

CVE-2006-3567


TITLE

Juniper Networks DX System log Cross-site scripting vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200607-176

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the web administration interface logging feature in Juniper Networks (Redline) DX 5.1.x, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the username login field. Juniper Networks DX is prone to an HTML-injection vulnerability. This vulnerability exists because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks. Version 5.1 is vulnerable; other versions may also be affected. Juniper's DX application acceleration platform is a solution for improving the performance of Web applications. Because the syslog content in the web administration interface is not properly filtered, a malicious user can inject content into the username login field, resulting in the execution of the injected content if the administrative user browses the syslog. ---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Reversing must be a passion as your skills will be challenged on a daily basis and you will be working several hours everyday in IDA, Ollydbg, and with BinDiff. Often, it is also required that you write a PoC or even a working exploit to prove that an issue is exploitable. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Juniper Networks DX System Log Script Insertion SECUNIA ADVISORY ID: SA20990 VERIFY ADVISORY: http://secunia.com/advisories/20990/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting WHERE: >From remote SOFTWARE: Juniper Networks DX 5.x http://secunia.com/product/10978/ DESCRIPTION: Darren Bounds has reported a vulnerability for Juniper DX, which can be exploited by malicious people to conduct script insertion attacks. The vulnerability is caused due to insufficient filtering of the system log when displaying it in the web administration interface. This can be exploited to insert arbitrary HTML and script code via e.g. the username login field, which will be executed in a user's browser session in context of an affected site when malicious data is viewed. SOLUTION: Restrict access to the web administration console to trusted users only. PROVIDED AND/OR DISCOVERED BY: Darren Bounds ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047772.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2006-3567 // BID: 18926 // VULHUB: VHN-19675 // PACKETSTORM: 48146

AFFECTED PRODUCTS

vendor:junipermodel:dxscope:lteversion:5.1

Trust: 1.0

vendor:junipermodel:dxscope:eqversion:5.1

Trust: 0.6

vendor:junipermodel:dx application acceleration platformscope:eqversion:5.1

Trust: 0.3

sources: BID: 18926 // CNNVD: CNNVD-200607-176 // NVD: CVE-2006-3567

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-3567
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200607-176
value: MEDIUM

Trust: 0.6

VULHUB: VHN-19675
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-3567
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-19675
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-19675 // CNNVD: CNNVD-200607-176 // NVD: CVE-2006-3567

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-3567

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200607-176

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200607-176

EXTERNAL IDS

db:BIDid:18926

Trust: 2.0

db:SECUNIAid:20990

Trust: 1.8

db:NVDid:CVE-2006-3567

Trust: 1.7

db:SREASONid:1218

Trust: 1.7

db:OSVDBid:27131

Trust: 1.7

db:VUPENid:ADV-2006-2741

Trust: 1.7

db:SECTRACKid:1016462

Trust: 1.7

db:CNNVDid:CNNVD-200607-176

Trust: 0.7

db:BUGTRAQid:20060710 JUNIPER NETWORKS DX WEB ADMINISTRATION PERSISTENT SYSTEM LOG XSS VULNERABILITY

Trust: 0.6

db:XFid:27645

Trust: 0.6

db:VULHUBid:VHN-19675

Trust: 0.1

db:PACKETSTORMid:48146

Trust: 0.1

sources: VULHUB: VHN-19675 // BID: 18926 // PACKETSTORM: 48146 // CNNVD: CNNVD-200607-176 // NVD: CVE-2006-3567

REFERENCES

url:http://www.securityfocus.com/bid/18926

Trust: 1.7

url:http://www.osvdb.org/27131

Trust: 1.7

url:http://securitytracker.com/id?1016462

Trust: 1.7

url:http://secunia.com/advisories/20990

Trust: 1.7

url:http://securityreason.com/securityalert/1218

Trust: 1.7

url:http://www.securityfocus.com/archive/1/439758/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/2741

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27645

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/27645

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/439758/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/2741

Trust: 0.6

url:http://www.juniper.net

Trust: 0.3

url:/archive/1/439758

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/10978/

Trust: 0.1

url:http://secunia.com/advisories/20990/

Trust: 0.1

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-july/047772.html

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-19675 // BID: 18926 // PACKETSTORM: 48146 // CNNVD: CNNVD-200607-176 // NVD: CVE-2006-3567

CREDITS

Darren Bounds dbounds@gmail.com

Trust: 0.6

sources: CNNVD: CNNVD-200607-176

SOURCES

db:VULHUBid:VHN-19675
db:BIDid:18926
db:PACKETSTORMid:48146
db:CNNVDid:CNNVD-200607-176
db:NVDid:CVE-2006-3567

LAST UPDATE DATE

2024-08-14T15:14:55.794000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-19675date:2018-10-18T00:00:00
db:BIDid:18926date:2006-07-12T19:33:00
db:CNNVDid:CNNVD-200607-176date:2006-07-19T00:00:00
db:NVDid:CVE-2006-3567date:2018-10-18T16:48:00.923

SOURCES RELEASE DATE

db:VULHUBid:VHN-19675date:2006-07-13T00:00:00
db:BIDid:18926date:2006-07-10T00:00:00
db:PACKETSTORMid:48146date:2006-07-12T07:20:23
db:CNNVDid:CNNVD-200607-176date:2006-07-12T00:00:00
db:NVDid:CVE-2006-3567date:2006-07-13T01:05:00