CWE
79
Advisory Published
Updated

CVE-2019-0024: Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu

First published: Tue Jan 15 2019(Updated: )

A persistent cross-site scripting (XSS) vulnerability in the Email Collectors menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper Advanced Threat Protection>=5.0.0<5.0.3
Juniper ATP400
Juniper ATP700

Remedy

The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-0024?

    CVE-2019-0024 has been classified as a medium severity vulnerability due to its potential for data theft and unauthorized access.

  • How do I fix CVE-2019-0024?

    To fix CVE-2019-0024, users should upgrade to a patched version of Juniper Advanced Threat Prevention that is newer than 5.0.3.

  • Who is affected by CVE-2019-0024?

    Authenticated users of Juniper Advanced Threat Prevention versions between 5.0.0 and 5.0.3 are affected by CVE-2019-0024.

  • What can an attacker do with CVE-2019-0024?

    An attacker exploiting CVE-2019-0024 can inject arbitrary scripts to steal sensitive data and credentials from web administration sessions.

  • How does CVE-2019-0024 impact web administration security?

    CVE-2019-0024 compromises web administration security by allowing the injection of malicious scripts that can hijack user data.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203