ID

VAR-202210-1145


CVE

CVE-2022-22229


TITLE

Juniper Networks  Paragon Active Assurance Control Center  Cross-site scripting vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019215

DESCRIPTION

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-22229 // JVNDB: JVNDB-2022-019215 // VULHUB: VHN-409758

AFFECTED PRODUCTS

vendor:junipermodel:paragon active assurance control centerscope:eqversion:3.2.0

Trust: 1.0

vendor:junipermodel:paragon active assurance control centerscope:ltversion:3.1.1

Trust: 1.0

vendor:ジュニパーネットワークスmodel:paragon active assurance control centerscope: - version: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:paragon active assurance control centerscope:eqversion:3.2.0

Trust: 0.8

vendor:ジュニパーネットワークスmodel:paragon active assurance control centerscope:eqversion: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:paragon active assurance control centerscope:eqversion:3.1.1

Trust: 0.8

sources: JVNDB: JVNDB-2022-019215 // NVD: CVE-2022-22229

CVSS

SEVERITY

CVSSV2

CVSSV3

sirt@juniper.net: CVE-2022-22229
value: HIGH

Trust: 1.0

OTHER: JVNDB-2022-019215
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202210-1172
value: HIGH

Trust: 0.6

sirt@juniper.net: CVE-2022-22229
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.7
impactScore: 6.0
version: 3.1

Trust: 1.0

OTHER: JVNDB-2022-019215
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019215 // CNNVD: CNNVD-202210-1172 // NVD: CVE-2022-22229

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.1

problemtype:Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-409758 // JVNDB: JVNDB-2022-019215 // NVD: CVE-2022-22229

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-1172

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202210-1172

PATCH

title:Juniper Networks Paragon Active Assurance Fixes for cross-site scripting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=211486

Trust: 0.6

sources: CNNVD: CNNVD-202210-1172

EXTERNAL IDS

db:NVDid:CVE-2022-22229

Trust: 3.3

db:JUNIPERid:JSA69883

Trust: 2.5

db:JVNDBid:JVNDB-2022-019215

Trust: 0.8

db:CNNVDid:CNNVD-202210-1172

Trust: 0.6

db:VULHUBid:VHN-409758

Trust: 0.1

sources: VULHUB: VHN-409758 // JVNDB: JVNDB-2022-019215 // CNNVD: CNNVD-202210-1172 // NVD: CVE-2022-22229

REFERENCES

url:https://kb.juniper.net/jsa69883

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-22229

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-22229/

Trust: 0.6

sources: VULHUB: VHN-409758 // JVNDB: JVNDB-2022-019215 // CNNVD: CNNVD-202210-1172 // NVD: CVE-2022-22229

SOURCES

db:VULHUBid:VHN-409758
db:JVNDBid:JVNDB-2022-019215
db:CNNVDid:CNNVD-202210-1172
db:NVDid:CVE-2022-22229

LAST UPDATE DATE

2024-08-14T15:27:03.862000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-409758date:2022-10-20T00:00:00
db:JVNDBid:JVNDB-2022-019215date:2023-10-24T08:20:00
db:CNNVDid:CNNVD-202210-1172date:2022-10-21T00:00:00
db:NVDid:CVE-2022-22229date:2022-10-20T14:49:44.643

SOURCES RELEASE DATE

db:VULHUBid:VHN-409758date:2022-10-18T00:00:00
db:JVNDBid:JVNDB-2022-019215date:2023-10-24T00:00:00
db:CNNVDid:CNNVD-202210-1172date:2022-10-18T00:00:00
db:NVDid:CVE-2022-22229date:2022-10-18T03:15:10.130