// For flags

CVE-2009-3487

Juniper Junos 8.5/9.0 J - Web Interface (Multiple Script) 'm[]' Cross-Site Scripting

Severity Score

3.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

5
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple cross-site scripting (XSS) vulnerabilities in the J-Web interface in Juniper JUNOS 8.5R1.14 allow remote authenticated users to inject arbitrary web script or HTML via (1) the JEXEC_OUTID parameter in a JEXEC_MODE_RELAY_OUTPUT action to the jexec program; the (2) act, (3) refresh-time, or (4) ifid parameter to scripter.php; (5) the revision parameter in a rollback action to the configuration program; the m[] parameter to the (6) monitor, (7) manage, (8) events, (9) configuration, or (10) alarms program; (11) the m[] parameter to the default URI; (12) the m[] parameter in a browse action to the default URI; (13) the wizard-next parameter in an https action to the configuration program; or the (14) Contact Information, (15) System Description, (16) Local Engine ID, (17) System Location, or (18) System Name Override SNMP parameter, related to the configuration program.

Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la interface J-Web en Juniper JUNOS v8.5R1.14 permite a usuarios autentificados remotos ejecutar código web o HTML a su elección a través de (1) el parámetro JEXEC_OUTID en una acción EXEC_MODE_RELAY_OUTPUT en el programa jexec; los parámetros (2) act, (3) refresh-time, o (4) ifid en scripter.php; (5) el parámetro revision en una acción rollback en el programa configuration; el parámetro m[] en el(6) monitor, (7) manage, (8) events, (9) configuration, o (10) programa alarms; (11) el parámetro m[] en la URI por defecto; (12) el parámetro m[] en una acción browse en la URI por defecto; (13) el parámetro wizard-next en una acción https en el programa configuración; o (14) Contact Information, (15) System Description, (16) Local Engine ID, (17) System Location, o (18) parámetro System Name Override SNMP , relacionado con el programa configuration program.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-09-22 First Exploit
  • 2009-09-30 CVE Reserved
  • 2009-09-30 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
8.5
Search vendor "Juniper" for product "Junos" and version "8.5"
r1.14
Affected