CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
33.1%
The version of Juniper ScreenOS running on the remote host is 6.3.x prior to 6.3.0r24. It is, therefore, affected by multiple cross-site scripting (XSS) vulnerabilities in the web user interface due to improper validation of user-supplied input before returning it to users. An authenticated, remote attacker who has a ‘security’ role can exploit this issue to inject HTML or JavaScript into the management session of other users, including the administrator.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(101840);
script_version("1.6");
script_cvs_date("Date: 2019/11/12");
script_cve_id(
"CVE-2017-2335",
"CVE-2017-2336",
"CVE-2017-2337",
"CVE-2017-2338",
"CVE-2017-2339"
);
script_bugtraq_id(99590);
script_xref(name:"JSA", value:"JSA10782");
script_name(english:"Juniper ScreenOS 6.3.x < 6.3.0r24 Multiple XSS (JSA10782)");
script_summary(english:"Checks the version of ScreenOS.");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple cross-site scripting
vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Juniper ScreenOS running on the remote host is 6.3.x
prior to 6.3.0r24. It is, therefore, affected by multiple cross-site
scripting (XSS) vulnerabilities in the web user interface due to
improper validation of user-supplied input before returning it to
users. An authenticated, remote attacker who has a 'security' role can
exploit this issue to inject HTML or JavaScript into the management
session of other users, including the administrator.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
script_set_attribute(attribute:"see_also", value:"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10782");
# http://www.juniper.net/techpubs/en_US/screenos6.3.0/information-products/pathway-pages/screenos/index.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c4eb1929");
script_set_attribute(attribute:"solution", value:
"Upgrade to Juniper ScreenOS version 6.3.0r24 or later. Alternatively,
apply the workaround referenced in the vendor's advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-2339");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/07/12");
script_set_attribute(attribute:"patch_publication_date", value:"2017/07/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/18");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:screenos");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Firewalls");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("screenos_version.nbin", "screenos_unsupported.nasl");
script_require_keys("Host/Juniper/ScreenOS/display_version", "Host/Juniper/ScreenOS/version");
script_exclude_keys("Host/Juniper/ScreenOS/unsupported");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
app_name = "Juniper ScreenOS";
display_version = get_kb_item_or_exit("Host/Juniper/ScreenOS/display_version");
version = get_kb_item_or_exit("Host/Juniper/ScreenOS/version");
if (get_kb_item("Host/Juniper/ScreenOS/unsupported"))
exit(0, app_name + " version " + display_version + " is installed and no longer supported, therefore, it was not checked.");
# prior to 6.3.0r24 are affected. 6.2 and prior are unsupported
# fix is 6.3.0r24 and later
if (ver_compare(ver:version, minver:"6.3.0.0", fix:"6.3.0.24", strict:FALSE) < 0)
{
display_fix = "6.3.0r24";
port = 0;
report =
'\n Installed version : ' + display_version +
'\n Fixed version : ' + display_fix +
'\n';
security_report_v4(port:port, extra:report, severity:SECURITY_NOTE, xss:TRUE);
}
else audit(AUDIT_INST_VER_NOT_VULN, app_name, display_version);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2335
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2336
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2337
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2338
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2339
www.nessus.org/u?c4eb1929
kb.juniper.net/InfoCenter/index?page=content&id=JSA10782
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
33.1%