First published: Wed Jan 10 2018(Updated: )
A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management device.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | =13.3-r1 | |
Juniper Networks Junos Space | =13.3-r2 | |
Juniper Networks Junos Space | =13.3-r4 | |
Juniper Networks Junos Space | =14.1-r1 | |
Juniper Networks Junos Space | =14.1-r2 | |
Juniper Networks Junos Space | =14.1-r3 | |
Juniper Networks Junos Space | =15.1-r1 | |
Juniper Networks Junos Space | =15.1-r2 | |
Juniper Networks Junos Space | =15.1-r3 | |
Juniper Networks Junos Space | =15.2-r1 | |
Juniper Networks Junos Space | =15.2-r2 | |
Juniper Networks Junos Space | =16.1-r1 | |
Juniper Networks Junos Space | =16.1-r2 | |
Juniper Networks Junos Space | =16.1-r3 | |
Juniper Networks Junos Space | =17.1-r1 |
The following software releases have been updated to resolve this specific issue: Junos Space 17.2R1 and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0011 has a medium severity rating due to its potential impact on sensitive data and session security.
To mitigate CVE-2018-0011, upgrade Junos Space to a version that resolves this reflected XSS vulnerability.
CVE-2018-0011 is caused by improper input validation allowing a remote authenticated user to inject malicious scripts.
CVE-2018-0011 affects authenticated users of specific versions of Junos Space network management software.
Exploiting CVE-2018-0011 allows attackers to steal sensitive user data, credentials, and perform unauthorized administrative actions.