Vulnerability Description
A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Screenos | 6.3.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99590Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038881Third Party AdvisoryVDB Entry
- https://kb.juniper.net/JSA10782Vendor Advisory
- http://www.securityfocus.com/bid/99590Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038881Third Party AdvisoryVDB Entry
- https://kb.juniper.net/JSA10782Vendor Advisory
FAQ
What is CVE-2017-2335?
CVE-2017-2335 is a vulnerability with a CVSS score of 8.4 (HIGH). A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript ...
How severe is CVE-2017-2335?
CVE-2017-2335 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2335?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Screenos.