Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h8xr-vrcj-c52v

Опубликовано: 18 окт. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.4

Описание

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1.

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1.

EPSS

Процентиль: 71%
0.00659
Низкий

8.4 High

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 8.4
nvd
больше 3 лет назад

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1.

CVSS3: 8.4
fstec
больше 3 лет назад

Уязвимость компонента Control Center платформы тестирования и мониторинга физических, гибридных и виртуальных сетей Paragon Active Assurance (ранее известная как Netrounds), позволяющая нарушителю осуществлять межсайтовые сценарные атаки

EPSS

Процентиль: 71%
0.00659
Низкий

8.4 High

CVSS3

Дефекты

CWE-79