A persistent cross-site scripting (XSS) vulnerability in the file upload menu of Juniper ATP may allow an authenticated user to inject arbitrary scripts and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0825 | A persistent cross-site scripting (XSS) vulnerability in the file upload menu of Juniper ATP may allow an authenticated user to inject arbitrary scripts and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3. |
Fixes
Solution
The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.
Workaround
There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk.
References
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA10918 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T18:39:46.049Z
Reserved: 2018-10-11T00:00:00
Link: CVE-2019-0018
No data.
Status : Modified
Published: 2019-01-15T21:29:01.557
Modified: 2024-11-21T04:16:03.660
Link: CVE-2019-0018
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD