First published: Fri Mar 14 2014(Updated: )
Cross-site scripting (XSS) vulnerability in the Pulse Collaboration (Secure Meeting) user pages in Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS before 7.1r18, 7.3 before 7.3r10, 7.4 before 7.4r8, and 8.0 before 8.0r1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper IVE OS | =7.1 | |
Juniper IVE OS | =7.3 | |
Juniper IVE OS | =7.4 | |
Juniper IVE OS | =8.0 | |
=7.1 | ||
=7.3 | ||
=7.4 | ||
=8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-2291 is classified as high due to the potential for remote authenticated users to perform XSS attacks.
To fix CVE-2014-2291, update your Juniper Junos Pulse Secure Access Service to the latest version as listed in the vendor's advisories.
CVE-2014-2291 affects users of Juniper Junos Pulse Secure Access Service running IVE OS versions prior to 7.1r18, 7.3r10, 7.4r8, and 8.0r1.
CVE-2014-2291 can facilitate cross-site scripting (XSS) attacks that allow attackers to inject arbitrary web script or HTML.
Yes, exploitation of CVE-2014-2291 requires that the attacker be a remote authenticated user.