Vulnerability Name:

CCN-16574

Published:2004-06-30
Updated:2004-06-30
Summary:NetScreen is vulnerable to cross-site scripting, caused by improper filtering of user-supplied input. A remote attacker could create a zip archive containing a specially-crafted file with a virus, which when detected by the antivirus engine, generates a dialog box that displays the name of the malicious file. If the name of the file contains HTML code, the code would be executed on the system in the victim's Web browser within the security context of the hosting site, once the box is displayed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
2.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Juniper Support Web page
Juniper Networks :: Support

Source: CCN
Type: Juniper NetScreen Advisory 59147
Juniper Networks NetScreen 5GT Firewalls with AV

Source: XF
Type: UNKNOWN
netscreen-5gt-firewall-xss(16574)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:juniper:netscreen_screenos:5.0.0r1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:5.0.0r2:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:5.0.0r3:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:5.0.0r4:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:5.0.0r5:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:5.0.0r6:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:5.0.0r7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper netscreen screenos 5.0.0r1
    juniper netscreen screenos 5.0.0r2
    juniper netscreen screenos 5.0.0r3
    juniper netscreen screenos 5.0.0r4
    juniper netscreen screenos 5.0.0r5
    juniper netscreen screenos 5.0.0r6
    juniper netscreen screenos 5.0.0r7