Vulnerability Name:

CVE-2018-0059 (CCN-151055)

Assigned:2017-11-16
Published:2018-10-10
Updated:2019-10-09
Summary:A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26.
CVSS v3 Severity:5.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
5.4 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2018-0059

Source: XF
Type: UNKNOWN
juniper-screenos-cve20180059-xss(151055)

Source: CCN
Type: Juniper Networks Security Bulletin JSA10894
ScreenOS: Stored Cross-Site Scripting (XSS) vulnerability (CVE-2018-0059)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA10894

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r23:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r23b1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r24:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r24b1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:screenos:6.3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper netscreen screenos 6.3.0
    juniper netscreen screenos 6.3.0r1
    juniper netscreen screenos 6.3.0r2
    juniper netscreen screenos 6.3.0r3
    juniper netscreen screenos 6.3.0r4
    juniper netscreen screenos 6.3.0r5
    juniper netscreen screenos 6.3.0r6
    juniper netscreen screenos 6.3.0r7
    juniper netscreen screenos 6.3.0r8
    juniper netscreen screenos 6.3.0r9
    juniper netscreen screenos 6.3.0r10
    juniper netscreen screenos 6.3.0r11
    juniper netscreen screenos 6.3.0r12
    juniper netscreen screenos 6.3.0r13
    juniper netscreen screenos 6.3.0r14
    juniper netscreen screenos 6.3.0r15
    juniper netscreen screenos 6.3.0r16
    juniper netscreen screenos 6.3.0r17
    juniper netscreen screenos 6.3.0r18
    juniper netscreen screenos 6.3.0r19
    juniper netscreen screenos 6.3.0r21
    juniper netscreen screenos 6.3.0r22
    juniper netscreen screenos 6.3.0r23
    juniper netscreen screenos 6.3.0r23b1
    juniper netscreen screenos 6.3.0r24
    juniper netscreen screenos 6.3.0r24b1
    juniper netscreen screenos 6.3.0r25
    juniper screenos 6.3.0