exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Juniper Secure Access Cross Site Scripting

Juniper Secure Access Cross Site Scripting
Posted Mar 6, 2010
Authored by Logica

Juniper Secure Access suffers from a cross site scripting vulnerability. SA Appliances running Juniper IVE OS 6.0 or higher are affected.

tags | advisory, xss
systems | juniper
SHA-256 | 0882671fc019f10145475cd894b03e06c77f59799dbbcde50b40394c2be3d4ee

Juniper Secure Access Cross Site Scripting

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

o PROBLEM DETAILS

The Juniper Secure Access (SA) web interface allows users to manage the
bookmarks on their landing page. This bookmark management functionality
does not filter user input properly and can allow cross site scripting
attacks.

Upon modification or creation of a bookmark, the editbk.cgi script is
requested with a parameter named "row". This parameter identifies the
bookmark in question and its value is used in the server response. It is a
flaw in the input handling of this "row" parameter that makes the appliance
vulnerable to a cross site scripting attack.

Successful exploitation could allow a remote attacker to hijack an
authenticated session between a victim and the Juniper SA web interface.

Usage of the Single Sign-On (SSO) feature will severely increase the impact
as SSO automatically grants the hijacked session access to other systems
(e.g. typically used in combination with Outlook Web Access).

o AFFECTED SYSTEMS

Juniper SA appliances running Juniper IVE OS 6.0 or higher

o SOLUTION

Juniper released IVE updates 6.3R7, 6.4R5 and 6.5R2 which fix this issue.
The updates and installation instructions are available for Juniper
customers on the Juniper website (note: login required)
https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumbe
r=PSN-2010-02-660&viewMode=view

Alternatively, the bookmark functionality can be temporary disabled until
the Juniper update has been applied. A Juniper administrator can disable
the bookmark functionality via the Central Manager by unchecking the "User
can add bookmarks" option in the "Web" tab of the active user roles.

o CREDITS

This vulnerability was discovered by Niels Heinen from the security testing
services team of Logica Nederland B.V.
Author: Logica Nederland B.V. ("Logica")

o ABOUT LOGICA

Logica is a business and technology service company, employing 39,000
people. We're experts in security, and have been for over 40 years. We
help our clients to succeed against their competition by providing services
others cannot deliver, securely. Creating confidence with customers,
supporting growth. Keeping their brand highly regarded in the digital
world. With a secure organisation, new ways are possible, such as using
the cloud, mobile apps, outsourcing. We also help our clients to detect
and prevent fraudulent and criminal behaviour. Creating confidence for
society that you are protecting them from the increasing global threats in
the physical and on-line world. Ensuring vital services, such as energy and
telecoms, will be delivered without disruption.

o DISCLAIMER

Logica is not responsible for the use of the information we provide through
the advisories. Use of the information constitutes acceptance for use in an
as-is condition. There are no warranties with egard to this information.
Neither the author not the publisher accepts any liability for any direct,
indirect or consequential loss or damage arising from use of, or reliance
on, this information.



-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.0.1 (Build 4020)
Charset: utf-8

wsBVAwUBS5Ds3LoMEKjkBtO0AQgh9wf+JnKBe4/T1gaMqq1iblKrAE4HBd829G06
Z4h2WawQ5DVp5FHR7sKtM7bldXbwML/fdyTsWD8R/EJ3DAJI/zqUuYqDt9Ur5aWz
yB8aWU8QyiPwFTOWz8s2kUjl9VOnmEb6Rwtpn+jS1RoRCV/6AX8/uRS/UKOsznaD
/tyY3931+TZ3AlEa1hECTha05ngoZSCexgOOJokYsRxKzNribR9UT9GdEpHNr7MZ
IVqQ9lLLoySPj5jjjoacUZr7s/DM0aHaDLKgyMSjwBDZ8aIr3lqDTCdBngBSLZDC
aFk4wLNbYOfyvA3lA2GzD2GegMesWAgQtAxN4X/36mMUsq8YeQCVHA==
=hOgD
-----END PGP SIGNATURE-----


Please help Logica to respect the environment by not printing this email / Pour contribuer comme Logica au respect de l'environnement, merci de ne pas imprimer ce mail / Bitte drucken Sie diese Nachricht nicht aus und helfen Sie so Logica dabei, die Umwelt zu sch|tzen. / Por favor ajude a Logica a respeitar o ambiente nao imprimindo este correio electronico.



This e-mail and any attachment is for authorised use by the intended recipient(s) only. It may contain proprietary material, confidential information and/or be subject to legal privilege. It should not be copied, disclosed to, retained or used by, any other party. If you are not an intended recipient then please promptly delete this e-mail and any attachment and all copies and inform the sender. Thank you.

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close