| Title | ScreenOS における複数のクロスサイトスクリプティングの脆弱性 |
|---|---|
| Summary | Juniper Networks が提供する ScreenOS には、複数のクロスサイトスクリプティングの脆弱性が存在します。 この脆弱性情報は、情報セキュリティ早期警戒パートナーシップに基づき下記の方が IPA に報告し、JPCERT/CC が開発者との調整を行いました。 報告者: 三井物産セキュアディレクション株式会社 米山 俊嗣 氏、望月岳 氏 |
| Possible impacts | 当該製品にログインしているユーザのウェブブラウザ上で、任意のスクリプトを実行される可能性があります。 |
| Solution | [アップデートする] 開発者が提供する情報をもとに最新版へアップデートしてください。 |
| Publication Date | July 24, 2017, midnight |
| Registration Date | July 24, 2017, 12:03 p.m. |
| Last Update | Aug. 8, 2017, 2:17 p.m. |
| CVSS3.0 : 重要 | |
| Score | 8.4 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
| CVSS2.0 : 警告 | |
| Score | 4 |
|---|---|
| Vector | AV:N/AC:L/Au:S/C:N/I:P/A:N |
| ジュニパーネットワークス |
| ScreenOS 6.3.0r24 より前のバージョン |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2017年07月24日] 掲載 [2017年08月02日] 概要:内容を更新 [2017年08月08日] 参考情報:National Vulnerability Database (NVD) (CVE-2017-2335) を追加 参考情報:National Vulnerability Database (NVD) (CVE-2017-2336) を追加 参考情報:National Vulnerability Database (NVD) (CVE-2017-2337) を追加 参考情報:National Vulnerability Database (NVD) (CVE-2017-2338) を追加 参考情報:National Vulnerability Database (NVD) (CVE-2017-2339) を追加 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue. |
|---|---|
| Publication Date | July 17, 2017, 10:18 p.m. |
| Registration Date | Jan. 26, 2021, 1:22 p.m. |
| Last Update | Nov. 21, 2024, 12:23 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:* | |||||
| Summary | A reflected cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a network based attacker to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the attacker to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue. |
|---|---|
| Publication Date | July 17, 2017, 10:18 p.m. |
| Registration Date | Jan. 26, 2021, 1:22 p.m. |
| Last Update | Nov. 21, 2024, 12:23 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:* | |||||
| Summary | A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue. |
|---|---|
| Publication Date | July 17, 2017, 10:18 p.m. |
| Registration Date | Jan. 26, 2021, 1:22 p.m. |
| Last Update | Nov. 21, 2024, 12:23 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:* | |||||
| Summary | A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue. |
|---|---|
| Publication Date | July 17, 2017, 10:18 p.m. |
| Registration Date | Jan. 26, 2021, 1:22 p.m. |
| Last Update | Nov. 21, 2024, 12:23 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:* | |||||
| Summary | A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue. |
|---|---|
| Publication Date | July 17, 2017, 10:18 p.m. |
| Registration Date | Jan. 26, 2021, 1:22 p.m. |
| Last Update | Nov. 21, 2024, 12:23 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:* | |||||