First published: Wed Oct 10 2018(Updated: )
A persistent cross-site scripting vulnerability in the UI framework used by Junos Space Security Director may allow authenticated users to inject persistent and malicious scripts. This may allow stealing of information or performing actions as a different user when other users access the Security Director web interface. This issue affects all versions of Juniper Networks Junos Space Security Director prior to 17.2R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos Space | =13.3-r1 | |
Juniper Junos Space | =13.3-r2 | |
Juniper Junos Space | =14.1-r1 | |
Juniper Junos Space | =14.1-r2 | |
Juniper Junos Space | =14.1-r3 | |
Juniper Junos Space | =15.1-r1 | |
Juniper Junos Space | =15.1-r2 | |
Juniper Junos Space | =15.1-r3 | |
Juniper Junos Space | =15.1-r4 | |
Juniper Junos Space | =15.2-r1 | |
Juniper Junos Space | =15.2-r2 | |
Juniper Junos Space | =16.1-r1 | |
Juniper Junos Space | =16.1-r2 | |
Juniper Junos Space | =16.1-r3 | |
Juniper Junos Space | =17.1-r1 | |
Juniper Junos Space | =17.2-r1 |
The following software releases have been updated to resolve this specific issue: Junos Space Security Director 17.2R2, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.