ID

VAR-200902-0202


CVE

CVE-2008-6096


TITLE

Juniper NetScreen ScreenOS Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2009-001003

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page. ScreenOS is prone to an HTML-injection vulnerability because its administrative web interface fails to sufficiently sanitize user-supplied input data. Attacker-supplied HTML and script code would run in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. The issue affects ScreenOS 5.4.0r9.0. Juniper NetScreen ScreenOS is the core operating system of NetScreen firewall and other network products. Juniper NetScreen ScreenOS versions earlier than 5.4r10, 6.0r6 and 6.1r2 have a cross-site scripting vulnerability. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Juniper NetScreen ScreenOS Script Insertion Vulnerability SECUNIA ADVISORY ID: SA32078 VERIFY ADVISORY: http://secunia.com/advisories/32078/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: NetScreen ScreenOS 5.x http://secunia.com/advisories/product/2569/ NetScreen ScreenOS 6.x http://secunia.com/advisories/product/18925/ DESCRIPTION: A vulnerability has been reported in Juniper NetScreen ScreenOS, which can be exploited by malicious people to conduct script insertion attacks. This can be exploited to insert arbitrary HTML and script code, which will be executed in another user's browser session in context of the web interface when the event logs are viewed. The vulnerability is reported in version 5.4.0r9.0 and reportedly also affects versions prior to 6.0r6 and 6.1r2. SOLUTION: Update to version 5.4r10, 6.0r6, or 6.1r2. PROVIDED AND/OR DISCOVERED BY: Deral Heiland, Layered Defense ORIGINAL ADVISORY: Layered Defense: http://www.layereddefense.com/netscreen01oct.html Juniper (login required): https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-009&viewMode=view ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-6096 // JVNDB: JVNDB-2009-001003 // BID: 31528 // VULHUB: VHN-36221 // PACKETSTORM: 70555

AFFECTED PRODUCTS

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r9

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.0.0r6

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:2.0.0

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:2.5.0

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r8

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r3

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r7

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.1.0r2

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.0

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:1.6.0

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:5.1.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.1r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.1r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r10

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.0r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r10

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r8

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r12

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r12

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r10

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r8

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r1.1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r10

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.1r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r9

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.2.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.2.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.7.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.1.0r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r8

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.1r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r8

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r8a

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r11

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.1.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.7.1r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r10

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r11

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r9

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.7.1r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r11

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r8

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.0r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.2.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.2.0r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r12

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r8

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.1r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r10

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.1r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.1r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.7.1r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r9

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:lteversion:5.4.0r9.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r8

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.1.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r9

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.0.0r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r9

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.1.0r8

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.1r9

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.3.0r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.6.1r11

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.1.0r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.3r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:3.0.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.3r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:2.7.1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:4.0.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:5.4.0r2

Trust: 1.0

vendor:junipermodel:screenosscope:ltversion:5.4r10

Trust: 0.8

vendor:junipermodel:screenosscope:ltversion:6.0r6

Trust: 0.8

vendor:junipermodel:screenosscope:ltversion:6.1r2

Trust: 0.8

vendor:junipermodel:networks screenos r9.0scope:eqversion:5.4

Trust: 0.3

vendor:junipermodel:networks screenos r2scope:neversion:6.1

Trust: 0.3

vendor:junipermodel:networks screenos r6scope:neversion:6.0

Trust: 0.3

vendor:junipermodel:networks screenos r10scope:neversion:5.4

Trust: 0.3

sources: BID: 31528 // JVNDB: JVNDB-2009-001003 // CNNVD: CNNVD-200902-162 // NVD: CVE-2008-6096

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-6096
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-6096
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200902-162
value: MEDIUM

Trust: 0.6

VULHUB: VHN-36221
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-6096
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-36221
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-36221 // JVNDB: JVNDB-2009-001003 // CNNVD: CNNVD-200902-162 // NVD: CVE-2008-6096

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-36221 // JVNDB: JVNDB-2009-001003 // NVD: CVE-2008-6096

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200902-162

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200902-162

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001003

PATCH

title:PSN-2008-09-009url:https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-009&viewMode=view

Trust: 0.8

sources: JVNDB: JVNDB-2009-001003

EXTERNAL IDS

db:BIDid:31528

Trust: 2.8

db:NVDid:CVE-2008-6096

Trust: 2.8

db:SECUNIAid:32078

Trust: 2.6

db:VUPENid:ADV-2008-2713

Trust: 2.5

db:JVNDBid:JVNDB-2009-001003

Trust: 0.8

db:CNNVDid:CNNVD-200902-162

Trust: 0.7

db:VULHUBid:VHN-36221

Trust: 0.1

db:PACKETSTORMid:70555

Trust: 0.1

sources: VULHUB: VHN-36221 // BID: 31528 // JVNDB: JVNDB-2009-001003 // PACKETSTORM: 70555 // CNNVD: CNNVD-200902-162 // NVD: CVE-2008-6096

REFERENCES

url:http://www.securityfocus.com/bid/31528

Trust: 2.5

url:http://www.layereddefense.com/netscreen01oct.html

Trust: 2.1

url:http://www.vupen.com/english/advisories/2008/2713

Trust: 1.9

url:http://secunia.com/advisories/32078

Trust: 1.7

url:http://secunia.com/advisories/32078/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-6096

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-6096

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2713

Trust: 0.6

url:http://www.juniper.net/

Trust: 0.3

url:/archive/1/496931

Trust: 0.3

url:https://www.juniper.net/alerts/viewalert.jsp?actionbtn=search&txtalertnumber=psn-2008-09-009&viewmode=view

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://secunia.com/advisories/product/18925/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/2569/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-36221 // BID: 31528 // JVNDB: JVNDB-2009-001003 // PACKETSTORM: 70555 // CNNVD: CNNVD-200902-162 // NVD: CVE-2008-6096

CREDITS

Deral Heiland

Trust: 0.3

sources: BID: 31528

SOURCES

db:VULHUBid:VHN-36221
db:BIDid:31528
db:JVNDBid:JVNDB-2009-001003
db:PACKETSTORMid:70555
db:CNNVDid:CNNVD-200902-162
db:NVDid:CVE-2008-6096

LAST UPDATE DATE

2024-11-23T22:57:01.884000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-36221date:2011-03-08T00:00:00
db:BIDid:31528date:2015-04-16T17:53:00
db:JVNDBid:JVNDB-2009-001003date:2009-02-13T00:00:00
db:CNNVDid:CNNVD-200902-162date:2009-02-12T00:00:00
db:NVDid:CVE-2008-6096date:2024-11-21T00:55:39.620

SOURCES RELEASE DATE

db:VULHUBid:VHN-36221date:2009-02-09T00:00:00
db:BIDid:31528date:2008-10-01T00:00:00
db:JVNDBid:JVNDB-2009-001003date:2009-02-13T00:00:00
db:PACKETSTORMid:70555date:2008-10-02T21:01:10
db:CNNVDid:CNNVD-200902-162date:2009-02-09T00:00:00
db:NVDid:CVE-2008-6096date:2009-02-09T17:30:00.297