CWE
79
Advisory Published
Updated

CVE-2008-6096: XSS

First published: Mon Feb 09 2009(Updated: )

Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Juniper ScreenOS=1.6.0
Juniper ScreenOS<=5.4.0r9.0
Juniper ScreenOS=2.0.0
Juniper ScreenOS=2.5.0
Juniper ScreenOS=2.6.0
Juniper ScreenOS=2.6.1
Juniper ScreenOS=2.6.1r1
Juniper ScreenOS=2.6.1r2
Juniper ScreenOS=2.6.1r3
Juniper ScreenOS=2.6.1r4
Juniper ScreenOS=2.6.1r5
Juniper ScreenOS=2.6.1r6
Juniper ScreenOS=2.6.1r7
Juniper ScreenOS=2.6.1r8
Juniper ScreenOS=2.6.1r9
Juniper ScreenOS=2.6.1r10
Juniper ScreenOS=2.6.1r11
Juniper ScreenOS=2.6.1r12
Juniper ScreenOS=2.7.0
Juniper ScreenOS=2.7.1
Juniper ScreenOS=2.7.1r1
Juniper ScreenOS=2.7.1r2
Juniper ScreenOS=2.7.1r3
Juniper ScreenOS=3.0.0
Juniper ScreenOS=3.0.0r1
Juniper ScreenOS=3.0.0r2
Juniper ScreenOS=3.0.0r3
Juniper ScreenOS=3.0.0r4
Juniper ScreenOS=3.0.1
Juniper ScreenOS=3.0.1r1
Juniper ScreenOS=3.0.1r2
Juniper ScreenOS=3.0.1r3
Juniper ScreenOS=3.0.1r4
Juniper ScreenOS=3.0.1r5
Juniper ScreenOS=3.0.1r6
Juniper ScreenOS=3.0.1r7
Juniper ScreenOS=3.0.2
Juniper ScreenOS=3.0.3
Juniper ScreenOS=3.0.3r1
Juniper ScreenOS=3.0.3r1.1
Juniper ScreenOS=3.0.3r2
Juniper ScreenOS=3.0.3r3
Juniper ScreenOS=3.0.3r4
Juniper ScreenOS=3.0.3r5
Juniper ScreenOS=3.0.3r6
Juniper ScreenOS=3.0.3r7
Juniper ScreenOS=3.0.3r8
Juniper ScreenOS=3.1.0
Juniper ScreenOS=3.1.0r1
Juniper ScreenOS=3.1.0r2
Juniper ScreenOS=3.1.0r3
Juniper ScreenOS=3.1.0r4
Juniper ScreenOS=3.1.0r5
Juniper ScreenOS=3.1.0r6
Juniper ScreenOS=3.1.0r7
Juniper ScreenOS=3.1.0r8
Juniper ScreenOS=3.1.0r9
Juniper ScreenOS=3.1.0r10
Juniper ScreenOS=3.1.0r11
Juniper ScreenOS=3.1.0r12
Juniper ScreenOS=4.0.0
Juniper ScreenOS=4.0.0
Juniper ScreenOS=4.0.0
Juniper ScreenOS=4.0.0r1
Juniper ScreenOS=4.0.0r2
Juniper ScreenOS=4.0.0r3
Juniper ScreenOS=4.0.0r4
Juniper ScreenOS=4.0.0r5
Juniper ScreenOS=4.0.0r6
Juniper ScreenOS=4.0.0r7
Juniper ScreenOS=4.0.0r8
Juniper ScreenOS=4.0.0r9
Juniper ScreenOS=4.0.0r10
Juniper ScreenOS=4.0.0r11
Juniper ScreenOS=4.0.0r12
Juniper ScreenOS=4.0.1
Juniper ScreenOS=4.0.1r1
Juniper ScreenOS=4.0.1r2
Juniper ScreenOS=4.0.1r3
Juniper ScreenOS=4.0.1r4
Juniper ScreenOS=4.0.1r5
Juniper ScreenOS=4.0.1r6
Juniper ScreenOS=4.0.1r7
Juniper ScreenOS=4.0.1r8
Juniper ScreenOS=4.0.1r9
Juniper ScreenOS=4.0.1r10
Juniper ScreenOS=4.0.2
Juniper ScreenOS=4.0.3
Juniper ScreenOS=4.0.3r1
Juniper ScreenOS=4.0.3r2
Juniper ScreenOS=4.0.3r3
Juniper ScreenOS=4.0.3r4
Juniper ScreenOS=4.0.3r5
Juniper ScreenOS=4.0.3r6
Juniper ScreenOS=4.0.3r7
Juniper ScreenOS=4.0.3r8
Juniper ScreenOS=4.0.3r9
Juniper ScreenOS=5.0.0
Juniper ScreenOS=5.0.0r1
Juniper ScreenOS=5.0.0r2
Juniper ScreenOS=5.0.0r3
Juniper ScreenOS=5.0.0r4
Juniper ScreenOS=5.0.0r5
Juniper ScreenOS=5.0.0r6
Juniper ScreenOS=5.0.0r7
Juniper ScreenOS=5.0.0r8
Juniper ScreenOS=5.0.0r9
Juniper ScreenOS=5.0.0r10
Juniper ScreenOS=5.0.0r11
Juniper ScreenOS=5.1.0
Juniper ScreenOS=5.1.0r1
Juniper ScreenOS=5.1.0r2
Juniper ScreenOS=5.1.0r3
Juniper ScreenOS=5.1.0r4
Juniper ScreenOS=5.2.0
Juniper ScreenOS=5.2.0r1
Juniper ScreenOS=5.2.0r2
Juniper ScreenOS=5.2.0r3
Juniper ScreenOS=5.3.0
Juniper ScreenOS=5.3.0r1
Juniper ScreenOS=5.3.0r2
Juniper ScreenOS=5.3.0r3
Juniper ScreenOS=5.3.0r4
Juniper ScreenOS=5.3.0r5
Juniper ScreenOS=5.3.0r6
Juniper ScreenOS=5.3.0r7
Juniper ScreenOS=5.3.0r8
Juniper ScreenOS=5.3.0r9
Juniper ScreenOS=5.3.0r10
Juniper ScreenOS=5.4.0
Juniper ScreenOS=5.4.0r1
Juniper ScreenOS=5.4.0r2
Juniper ScreenOS=5.4.0r3
Juniper ScreenOS=5.4.0r4
Juniper ScreenOS=5.4.0r5
Juniper ScreenOS=5.4.0r6
Juniper ScreenOS=5.4.0r7
Juniper ScreenOS=5.4.0r8
Juniper ScreenOS=5.4.0r8a
Juniper ScreenOS=6.0.0r6
Juniper ScreenOS=6.1.0r2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2008-6096?

    CVE-2008-6096 has a medium severity rating due to its potential for cross-site scripting attacks allowing unauthorized script injection.

  • How do I fix CVE-2008-6096?

    To mitigate CVE-2008-6096, upgrade to Juniper NetScreen ScreenOS version 5.4r10, 6.0r6, or 6.1r2 or later.

  • What systems are affected by CVE-2008-6096?

    CVE-2008-6096 affects multiple versions of Juniper NetScreen ScreenOS prior to 5.4r10 across various releases.

  • How does CVE-2008-6096 impact users?

    CVE-2008-6096 allows remote attackers to execute malicious scripts in the context of user sessions, potentially compromising sensitive information.

  • What is the nature of the vulnerability in CVE-2008-6096?

    CVE-2008-6096 is a cross-site scripting (XSS) vulnerability that allows for the injection of arbitrary web scripts or HTML via user input.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203