{ "CVE_data_meta" : { "ASSIGNER" : "sirt@juniper.net", "DATE_PUBLIC" : "2019-01-09T17:00:00.000Z", "ID" : "CVE-2019-0023", "STATE" : "PUBLIC", "TITLE" : " Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Juniper ATP", "version" : { "version_data" : [ { "affected" : "<", "version_name" : "5.0", "version_value" : "5.0.3" } ] } } ] }, "vendor_name" : "Juniper Networks" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "A persistent cross-site scripting (XSS) vulnerability in the Golden VM menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3." } ] }, "exploit" : [ { "lang" : "eng", "value" : "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "impact" : { "cvss" : { "attackComplexity" : "LOW", "attackVector" : "NETWORK", "availabilityImpact" : "NONE", "baseScore" : 5.4, "baseSeverity" : "MEDIUM", "confidentialityImpact" : "LOW", "integrityImpact" : "LOW", "privilegesRequired" : "LOW", "scope" : "CHANGED", "userInteraction" : "REQUIRED", "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version" : "3.0" } }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "XSS" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://kb.juniper.net/JSA10918", "refsource" : "CONFIRM", "url" : "https://kb.juniper.net/JSA10918" } ] }, "solution" : [ { "lang" : "eng", "value" : "The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases." } ], "source" : { "advisory" : "JSA10918", "defect" : [ "1365614" ], "discovery" : "INTERNAL" }, "work_around" : [ { "lang" : "eng", "value" : "There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk." } ] }