製品・ソフトウェアに関する情報
ScreenOS における複数のクロスサイトスクリプティングの脆弱性
Title ScreenOS における複数のクロスサイトスクリプティングの脆弱性
Summary

Juniper Networks が提供する ScreenOS には、複数のクロスサイトスクリプティングの脆弱性が存在します。 この脆弱性情報は、情報セキュリティ早期警戒パートナーシップに基づき下記の方が IPA に報告し、JPCERT/CC が開発者との調整を行いました。 報告者: 三井物産セキュアディレクション株式会社 米山 俊嗣 氏、望月岳 氏

Possible impacts 当該製品にログインしているユーザのウェブブラウザ上で、任意のスクリプトを実行される可能性があります。
Solution

[アップデートする] 開発者が提供する情報をもとに最新版へアップデートしてください。

Publication Date July 24, 2017, midnight
Registration Date July 24, 2017, 12:03 p.m.
Last Update Aug. 8, 2017, 2:17 p.m.
CVSS3.0 : 重要
Score 8.4
Vector CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
CVSS2.0 : 警告
Score 4
Vector AV:N/AC:L/Au:S/C:N/I:P/A:N
Affected System
ジュニパーネットワークス
ScreenOS 6.3.0r24 より前のバージョン
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2017年07月24日]
  掲載
[2017年08月02日]
  概要:内容を更新
[2017年08月08日]
  参考情報:National Vulnerability Database (NVD) (CVE-2017-2335) を追加
  参考情報:National Vulnerability Database (NVD) (CVE-2017-2336) を追加
  参考情報:National Vulnerability Database (NVD) (CVE-2017-2337) を追加
  参考情報:National Vulnerability Database (NVD) (CVE-2017-2338) を追加
  参考情報:National Vulnerability Database (NVD) (CVE-2017-2339) を追加
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2017-2335
Summary

A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue.

Publication Date July 17, 2017, 10:18 p.m.
Registration Date Jan. 26, 2021, 1:22 p.m.
Last Update Nov. 21, 2024, 12:23 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2017-2336
Summary

A reflected cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a network based attacker to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the attacker to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue.

Publication Date July 17, 2017, 10:18 p.m.
Registration Date Jan. 26, 2021, 1:22 p.m.
Last Update Nov. 21, 2024, 12:23 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2017-2337
Summary

A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue.

Publication Date July 17, 2017, 10:18 p.m.
Registration Date Jan. 26, 2021, 1:22 p.m.
Last Update Nov. 21, 2024, 12:23 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2017-2338
Summary

A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue.

Publication Date July 17, 2017, 10:18 p.m.
Registration Date Jan. 26, 2021, 1:22 p.m.
Last Update Nov. 21, 2024, 12:23 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2017-2339
Summary

A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue.

Publication Date July 17, 2017, 10:18 p.m.
Registration Date Jan. 26, 2021, 1:22 p.m.
Last Update Nov. 21, 2024, 12:23 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*
cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List