Exploit the possiblities

ProCheckUp Security Advisory 2007.41

ProCheckUp Security Advisory 2007.41
Posted Feb 28, 2008
Authored by ProCheckUp, Richard Brain | Site procheckup.com

Juniper Networks Secure Access 2000 versions prior to 5.5R3 are vulnerable to a cross site scripting vulnerability. Full details provided.

tags | exploit, xss
systems | juniper
MD5 | 152ed43ef865a56f7d6d4d31c80eef6b

ProCheckUp Security Advisory 2007.41

Change Mirror Download
PR07-41: XSS on Juniper Networks Secure Access 2000

Vulnerability found: 6th December 2007

Vendor informed: 12th December 2007

Severity: Medium-high


Juniper Networks Secure Access 2000 is vulnerable to a vanilla XSS.

Vulnerable server-side script: '/dana-na/auth/rdremediate.cgi'

Unfiltered parameter: 'delivery_mode'

Successfully tested on: Juniper Networks Secure Access 2000 (SA-2000)
5.5R1 (build 11711)

Proof of concept:




An attacker may be able to cause execution of malicious scripting code
in the browser of a victim user who clicks on a link to a Juniper
Networks Secure Access site. Such code would run within the security
context of the target domain.

This type of attack can result in non-persistent defacement of the
target site, or the redirection of confidential information (i.e.: admin
session IDs) to unauthorised third parties.


Juniper Networks was aware of this issue which they addressed on version
5.5R3. However, we decided to release this advisory due to lack of
information regarding this vulnerability in the public domain.



Credits: Richard Brain of ProCheckUp Ltd (www.procheckup.com)


User-Agent: curl/7.15.4 (i486-pc-linux-gnu) libcurl/7.15.4
OpenSSL/0.9.8b zlib/1.2.3 libidn/0.6.3
Host: target-domain.foo
Accept: */*




<APPLET id=NeoterisSetup > Unknown deliver mode
</APPLET><SCRIPT>alert('Can Cross Site Attack')</SCRIPT>
<PARAM NAME="Parameter0" VALUE="action=tryagain"></APPLET>


Copyright 2008 Procheckup Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the
Internet community for the purpose of alerting them to problems, if and
only if, the Bulletin is not edited or changed in any way, is attributed
to Procheckup, and provided such reproduction and/or distribution is
performed for non-commercial purposes.

Any other use of this information is prohibited. Procheckup is not
liable for any misuse of this information by any third party.


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    16 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    16 Files
  • 23
    Feb 23rd
    31 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By