A persistent cross-site scripting (XSS) vulnerability in the file upload menu of Juniper ATP may allow an authenticated user to inject arbitrary scripts and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-0825 | A persistent cross-site scripting (XSS) vulnerability in the file upload menu of Juniper ATP may allow an authenticated user to inject arbitrary scripts and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3. |
Fixes
Solution
The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.
Workaround
There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk.
References
Link | Providers |
---|---|
https://kb.juniper.net/JSA10918 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T18:39:46.049Z
Reserved: 2018-10-11T00:00:00
Link: CVE-2019-0018

No data.

Status : Modified
Published: 2019-01-15T21:29:01.557
Modified: 2024-11-21T04:16:03.660
Link: CVE-2019-0018

No data.

No data.