Vulnerability Name:

CVE-2017-2339 (CCN-128508)

Assigned:2016-12-01
Published:2017-07-13
Updated:2017-07-22
Summary:A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue.
CVSS v3 Severity:5.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H)
8.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
8.3 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:M/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Multiple_Instances
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2017-2339

Source: BID
Type: Third Party Advisory, VDB Entry
99590

Source: CCN
Type: BID-99590
Juniper ScreenOS Multiple HTML Injection Vulnerabilities

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1038881

Source: XF
Type: UNKNOWN
juniper-cve20172339-xss(128508)

Source: CCN
Type: Juniper Networks Security Bulletin JSA10782
Multiple XSS vulnerabilities in ScreenOS Firewall

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA10782

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:screenos:6.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*
  • OR cpe:/o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper screenos 6.3.0
    juniper screenos 6.3.0 r1
    juniper screenos 6.3.0 r10
    juniper screenos 6.3.0 r11
    juniper screenos 6.3.0 r12
    juniper screenos 6.3.0 r13
    juniper screenos 6.3.0 r14
    juniper screenos 6.3.0 r15
    juniper screenos 6.3.0 r16
    juniper screenos 6.3.0 r17
    juniper screenos 6.3.0 r18
    juniper screenos 6.3.0 r19
    juniper screenos 6.3.0 r2
    juniper screenos 6.3.0 r21
    juniper screenos 6.3.0 r22
    juniper screenos 6.3.0 r23
    juniper screenos 6.3.0 r23b
    juniper screenos 6.3.0 r3
    juniper screenos 6.3.0 r4
    juniper screenos 6.3.0 r5
    juniper screenos 6.3.0 r6
    juniper screenos 6.3.0 r7
    juniper screenos 6.3.0 r8
    juniper screenos 6.3.0 r9