2014-03 Security Bulletin: Junos Pulse Secure Access Service (SSL VPN): Cross site scripting issue (CVE-2014-2291)

Product Affected:This issue can affect all: SA700, SA2000, SA2500, SA4000, FIPS SA4000, SA4500, FIPS SA4500, SA6000, FIPS SA6000, SA6500, FIPS SA6500, MAG2600, MAG4610, MAG6610, and MAG6611. The affected software releases includes IVE OS 7.1, 7.3, 7.4, and 8.0.

Problem:A cross site scripting issue has been found in the Juniper Networks SSL VPN product. The problem is a result of incorrect user input validation on the SSL VPN web server. The issue exists within a file that pertains to the Pulse Collaboration (Secure Meeting) user pages that are only accessible by an authenticated session. This issue is only present when the Pulse Collaboration feature is enabled on a user’s role.Juniper SIRT is not aware of any malicious exploitation of this vulnerability.No other Juniper Networks products or platforms are affected by this issue.This issue has been assigned CVE-2014-2291.

Solution:The issue is fixed in SA/MAG (IVE OS) releases: 8.0r1, 7.4r8, 7.3r10, and 7.1r18, and all subsequent releases.KB16765 – “In which releases are vulnerabilities fixed?” describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.

Workaround:This issue can be avoided if the Pulse Collaboration (Secure Meeting) feature is disabled. If this feature is enabled an upgrade to a fixed version is required to resolve this issue.To disable this feature, navigate the admin page to following page: Users –> User Roles –> (uncheck) “Meetings” –> Click ” Save”

Implementation: 

Related Links: CVSS Score:4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Risk Level:Low

Risk Assessment:Successful exploit of this vulnerability could allow an attacker to dynamically create arbitrary active content which could be rendered in the user’s browser, leading to possible session theft, service disruption, or other information disclosure.

Acknowledgements: 

Leave a Reply