A persistent cross-site scripting (XSS) vulnerability in RADIUS configuration menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-0832 | A persistent cross-site scripting (XSS) vulnerability in RADIUS configuration menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3. |
Fixes
Solution
The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.
Workaround
There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk.
References
Link | Providers |
---|---|
https://kb.juniper.net/JSA10918 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T00:21:45.869Z
Reserved: 2018-10-11T00:00:00
Link: CVE-2019-0025

No data.

Status : Modified
Published: 2019-01-15T21:29:01.837
Modified: 2024-11-21T04:16:04.573
Link: CVE-2019-0025

No data.

No data.