ScreenOS: XSS vulnerability in ScreenOS Firewall
Summary
| CVE | CVE-2017-2338 |
|---|---|
| State | PUBLISHED |
| Assigner | juniper |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-07-17 13:18:24 UTC |
| Updated | 2025-04-20 01:37:25 UTC |
| Description | A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue. |
Risk And Classification
Primary CVSS: v3.0 5.4 MEDIUM from [email protected]
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Problem Types: CWE-79 | persistent cross site scripting vulnerability
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 5.4 | MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
| 3.0 | [email protected] | Secondary | 8.4 | HIGH | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
| 3.0 | CNA | DECLARED | 8.4 | HIGH | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 3.5 | AV:N/AC:M/Au:S/C:N/I:P/A:N |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
RequiredScope
ChangedConfidentiality
LowIntegrity
LowAvailability
NoneCVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
SingleConfidentiality
NoneIntegrity
PartialAvailability
NoneAV:N/AC:M/Au:S/C:N/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Juniper | Screenos | 6.3.0 | All | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r1 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r10 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r11 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r12 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r13 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r14 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r15 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r16 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r17 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r18 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r19 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r2 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r21 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r22 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r23 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r23b | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r3 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r4 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r5 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r6 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r7 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r8 | All | All |
| Operating System | Juniper | Screenos | 6.3.0 | r9 | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Juniper Networks | ScreenOS | affected 6.3.0 prior to 6.3.0r24 | SSG Series |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Juniper ScreenOS Multiple HTML Injection Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| 2017-07 Security Bulletin: ScreenOS: Multiple XSS vulnerabilities in ScreenOS Firewall - Juniper Networks | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | Vendor Advisory |
| Juniper ScreenOS Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Gaku Mochizuki/Toshitsugu Yoneyama from Mitsui Bussan Secure Directions, Inc., for reporting this issue to the JPCERT/CC. (en)
CNA: Craig Young, Principal Security Researcher, Tripwire VERT, for responsibly reporting this vulnerability. (en)
Additional Advisory Data
Workarounds
CNA: Use access lists or firewall filters to limit access to the firewall's WebUI only from trusted hosts.
There are currently no legacy QID mappings associated with this CVE.