Juniper Junos J-Web Multiple Vulnerabilities (JSA10682)

critical Nessus Plugin ID 85224

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version number, the remote Juniper Junos device is affected by multiple vulnerabilities in the J-Web component :

- A cross-site scripting vulnerability exists due to a failure to validate input before returning it to users.
A remote attacker, using a crafted request, can exploit this to gain access to session credentials or execute administrative actions through the user's browser.

- A denial of service vulnerability exists in error handling that allows an attacker to crash the J-Web service.

Note that these issues only affects devices with J-Web enabled.

Solution

Apply the relevant Junos software release or workaround referenced in Juniper advisory JSA10682.

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10682

Plugin Details

Severity: Critical

ID: 85224

File Name: juniper_jsa10682.nasl

Version: 1.11

Type: combined

Published: 8/4/2015

Updated: 7/12/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/JUNOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 7/8/2015

Vulnerability Publication Date: 7/8/2015

Reference Information

CVE: CVE-2014-6447

BID: 75717

JSA: JSA10682