A persistent cross-site scripting (XSS) vulnerability in the file upload menu of Juniper ATP may allow an authenticated user to inject arbitrary scripts and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0825 A persistent cross-site scripting (XSS) vulnerability in the file upload menu of Juniper ATP may allow an authenticated user to inject arbitrary scripts and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Fixes

Solution

The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.


Workaround

There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T18:39:46.049Z

Reserved: 2018-10-11T00:00:00

Link: CVE-2019-0018

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-15T21:29:01.557

Modified: 2024-11-21T04:16:03.660

Link: CVE-2019-0018

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.