Juniper Instant Virtual Extranet (IVE) Input Validation Hole in 'editbk.cgi' Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID: 1023689|
SecurityTracker URL: http://securitytracker.com/id/1023689
(Links to External Site)
Date: Mar 5 2010
Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 6.0 up to 6.3R7, 6.4R5 and 6.5R2|
A vulnerability was reported in Juniper Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks.|
The Juniper Secure Access (SA) web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the IVE appliance and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
The 'row' parameter of the bookmark management function (editbk.cgi) is affected.
Niels Heinen of Logica Nederland B.V. reported this vulnerability.
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the Instant Virtual Extranet (IVE) device, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.|
The vendor has issued a fix (6.3R7, 6.4R5 and 6.5R2).|
The vendor's advisory is available to customers at:
No publicly accessible advisory is available.
Vendor URL: www.juniper.net/ (Links to External Site)
Input validation error|
Source Message Contents
Subject: Juniper SA Series Cross Site Scripting Issue|
-----BEGIN PGP SIGNED MESSAGE-----
o PROBLEM DETAILS
The Juniper Secure Access (SA) web interface allows users to manage the
bookmarks on their landing page. This bookmark management functionality
does not filter user input properly and can allow cross site scripting
Upon modification or creation of a bookmark, the editbk.cgi script is
requested with a parameter named "row". This parameter identifies the
bookmark in question and its value is used in the server response. It is a
flaw in the input handling of this "row" parameter that makes the appliance
vulnerable to a cross site scripting attack.
Successful exploitation could allow a remote attacker to hijack an
authenticated session between a victim and the Juniper SA web interface.
Usage of the Single Sign-On (SSO) feature will severely increase the impact
as SSO automatically grants the hijacked session access to other systems
(e.g. typically used in combination with Outlook Web Access).
o AFFECTED SYSTEMS
Juniper SA appliances running Juniper IVE OS 6.0 or higher
Juniper released IVE updates 6.3R7, 6.4R5 and 6.5R2 which fix this issue.
The updates and installation instructions are available for Juniper
customers on the Juniper website (note: login required)
Alternatively, the bookmark functionality can be temporary disabled until
the Juniper update has been applied. A Juniper administrator can disable
the bookmark functionality via the Central Manager by unchecking the "User
can add bookmarks" option in the "Web" tab of the active user roles.
This vulnerability was discovered by Niels Heinen from the security testing
services team of Logica Nederland B.V.
Author: Logica Nederland B.V. ("Logica")
o ABOUT LOGICA
Logica is a business and technology service company, employing 39,000
people. We're experts in security, and have been for over 40 years. We
help our clients to succeed against their competition by providing services
others cannot deliver, securely. Creating confidence with customers,
supporting growth. Keeping their brand highly regarded in the digital
world. With a secure organisation, new ways are possible, such as using
the cloud, mobile apps, outsourcing. We also help our clients to detect
and prevent fraudulent and criminal behaviour. Creating confidence for
society that you are protecting them from the increasing global threats in
the physical and on-line world. Ensuring vital services, such as energy and
telecoms, will be delivered without disruption.
Logica is not responsible for the use of the information we provide through
the advisories. Use of the information constitutes acceptance for use in an
as-is condition. There are no warranties with egard to this information.
Neither the author not the publisher accepts any liability for any direct,
indirect or consequential loss or damage arising from use of, or reliance
on, this information.
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.0.1 (Build 4020)
-----END PGP SIGNATURE-----
Please help Logica to respect the environment by not printing this email / Pour contribuer comme Logica au respect de l'environnement, merci de ne pas imprimer ce mail / Bitte drucken Sie diese Nachricht nicht aus und helfen Sie so Logica dabei, die Umwelt zu sch|tzen. / Por favor ajude a Logica a respeitar o ambiente nao imprimindo este correio electronico.
This e-mail and any attachment is for authorised use by the intended recipient(s) only. It may contain proprietary material, confidential information and/or be subject to legal privilege. It should not be copied, disclosed to, retained or used by, any other party. If you are not an intended recipient then please promptly delete this e-mail and any attachment and all copies and inform the sender. Thank you.
Go to the Top of This SecurityTracker Archive Page