First published: Wed Jan 09 2019(Updated: )
A persistent cross-site scripting (XSS) vulnerability in the Zone configuration of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Advanced Threat Protection | >=5.0.0<5.0.3 | |
Juniper ATP400 | ||
Juniper ATP700 |
The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0026 is classified with a high severity rating due to its potential for persistent cross-site scripting (XSS) attacks.
To mitigate CVE-2019-0026, update your Juniper Advanced Threat Prevention software to version 5.0.4 or later.
CVE-2019-0026 affects users of Juniper Advanced Threat Prevention versions from 5.0.0 to 5.0.3.
CVE-2019-0026 is a persistent cross-site scripting (XSS) vulnerability which allows script injection and data theft.
CVE-2019-0026 can be exploited to inject arbitrary scripts, potentially allowing attackers to steal credentials from a web administration session.