"value":"A persistent cross-site scripting (XSS) vulnerability in RADIUS configuration menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3."
"value":"The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases."
}
],
"source":{
"advisory":"JSA10918",
"defect":[
"1365609"
],
"discovery":"INTERNAL"
},
"work_around":[
{
"lang":"eng",
"value":"There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk."