Date: 2 Oct 2008 01:59:24 -0000
From: [email protected]
To: [email protected]Subject: Layered Defense Research Advisory: Juniper Netscreen Firewall
Cross-Site-Scripting (XSS) event log injection
X-Virus-Scanned: antivirus-gw at tyumen.ru
Layered Defense Research Advisory 1 October 2008
1) Affected Product
Juniper Netscreen Firewall
ScreenOS version 5.4.0r9.0
2) Severity Rating:
Low - Moderate
Impact: Potential system compromises but requires user interaction.
3) Description of Vulnerability
A Cross-Site Scripting (XSS) Injection vulnerability was discovered within the Juniper Netscreen firewall NetOS version 5.4.0r9.0. The vulnerability is caused by failure to validate input from the web interface login, and telnet session login. This makes it possible for an attacker to inject javascript as part of the user name during login. The javascript is then stored in the device event logs. When the event logs are viewed within the Netscreen web console the javascript is executed. A successful attack would allow an attacker to run JavaScript on the computer system connecting to the netscreen web management console which could lead to system compromise.
4) Solution
Upgrade to ScreenOS versions 5.4r10, 6.0r6, 6.1r2, and later. If unsure if your product is vulnerable it is recommended that you contact the vendor.
5) Time Table:
04/07/2008 Reported Vulnerability to Vendor.
04/23/2008 Vendor acknowledged the vulnerability
10/01/2008 Vendor advisory published
6) Credits Discovered by Deral Heiland, www.LayeredDefense.com
7) Reference
https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-009&viewMode=view
8) About Layered Defense Layered Defense, Is a group of security professionals that work together on ethical Research,
Testing and Training within the information security arena. http://www.layereddefense.com