ID

VAR-201810-0081


CVE

CVE-2018-0059


TITLE

Juniper Networks ScreenOS Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2018-011015

DESCRIPTION

A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26. Juniper Networks ScreenOS Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Juniper ScreenOS is prone to a HTML-injection vulnerability because it fails to sanitize user-supplied input. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible

Trust: 1.98

sources: NVD: CVE-2018-0059 // JVNDB: JVNDB-2018-011015 // BID: 106205 // VULHUB: VHN-118261

AFFECTED PRODUCTS

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r24b1

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r22

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r18

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r23b1

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r25

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r19

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r23

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r21

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r24

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r17

Trust: 1.6

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r15

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r3

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r13

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r12

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r11

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r5

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r6

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r10

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r14

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r9

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r2

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r4

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r1

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r16

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r7

Trust: 1.0

vendor:junipermodel:netscreen screenosscope:eqversion:6.3.0r8

Trust: 1.0

vendor:junipermodel:screenosscope:eqversion:6.3.0r26

Trust: 0.8

vendor:junipermodel:screenosscope:ltversion:6.3.0

Trust: 0.8

vendor:junipermodel:screenosscope:eqversion:6.3

Trust: 0.3

vendor:junipermodel:screenos 6.3.0r24scope: - version: -

Trust: 0.3

vendor:junipermodel:screenos 6.3.0r22scope: - version: -

Trust: 0.3

vendor:junipermodel:screenos 6.3.0r21scope: - version: -

Trust: 0.3

vendor:junipermodel:screenos 6.3.0r20scope: - version: -

Trust: 0.3

vendor:junipermodel:screenos 6.3.0r19scope: - version: -

Trust: 0.3

vendor:junipermodel:screenos 6.3.0r13scope: - version: -

Trust: 0.3

vendor:junipermodel:screenos 6.3.0r12scope: - version: -

Trust: 0.3

vendor:junipermodel:screenos 6.3.0r26scope:neversion: -

Trust: 0.3

sources: BID: 106205 // JVNDB: JVNDB-2018-011015 // CNNVD: CNNVD-201810-527 // NVD: CVE-2018-0059

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0059
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2018-0059
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-0059
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201810-527
value: MEDIUM

Trust: 0.6

VULHUB: VHN-118261
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2018-0059
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-118261
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0059
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.0

Trust: 2.8

sources: VULHUB: VHN-118261 // JVNDB: JVNDB-2018-011015 // CNNVD: CNNVD-201810-527 // NVD: CVE-2018-0059 // NVD: CVE-2018-0059

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-118261 // JVNDB: JVNDB-2018-011015 // NVD: CVE-2018-0059

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201810-527

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201810-527

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011015

PATCH

title:JSA10894url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10894&actp=METADATA

Trust: 0.8

title:Juniper ScreenOS Fixes for cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86113

Trust: 0.6

sources: JVNDB: JVNDB-2018-011015 // CNNVD: CNNVD-201810-527

EXTERNAL IDS

db:NVDid:CVE-2018-0059

Trust: 2.8

db:JUNIPERid:JSA10894

Trust: 2.0

db:JVNDBid:JVNDB-2018-011015

Trust: 0.8

db:CNNVDid:CNNVD-201810-527

Trust: 0.7

db:BIDid:106205

Trust: 0.3

db:VULHUBid:VHN-118261

Trust: 0.1

sources: VULHUB: VHN-118261 // BID: 106205 // JVNDB: JVNDB-2018-011015 // CNNVD: CNNVD-201810-527 // NVD: CVE-2018-0059

REFERENCES

url:https://kb.juniper.net/jsa10894

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0059

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0059

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10894&actp=metadata

Trust: 0.3

sources: VULHUB: VHN-118261 // BID: 106205 // JVNDB: JVNDB-2018-011015 // CNNVD: CNNVD-201810-527 // NVD: CVE-2018-0059

CREDITS

Marcel Bilal from IT-Dienstleistungszentrum Berlin

Trust: 0.3

sources: BID: 106205

SOURCES

db:VULHUBid:VHN-118261
db:BIDid:106205
db:JVNDBid:JVNDB-2018-011015
db:CNNVDid:CNNVD-201810-527
db:NVDid:CVE-2018-0059

LAST UPDATE DATE

2024-11-23T22:48:34.228000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118261date:2019-10-09T00:00:00
db:BIDid:106205date:2018-10-10T00:00:00
db:JVNDBid:JVNDB-2018-011015date:2019-01-04T00:00:00
db:CNNVDid:CNNVD-201810-527date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0059date:2024-11-21T03:37:28.993

SOURCES RELEASE DATE

db:VULHUBid:VHN-118261date:2018-10-10T00:00:00
db:BIDid:106205date:2018-10-10T00:00:00
db:JVNDBid:JVNDB-2018-011015date:2019-01-04T00:00:00
db:CNNVDid:CNNVD-201810-527date:2018-10-11T00:00:00
db:NVDid:CVE-2018-0059date:2018-10-10T18:29:03.250