Vigil@nce - Junos Pulse SSL VPN/UAC: Cross Site Scripting
September 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting of Junos Pulse SSL
VPN/UAC, in order to execute JavaScript code in the context of the
web site.
– Impacted products: IVE OS, Junos Pulse, MAG Series, Juniper SA,
Juniper UAC
– Severity: 2/4
– Creation date: 10/09/2014
DESCRIPTION OF THE VULNERABILITY
The Junos Pulse Secure Access Service (SSL VPN) and Junos Pulse
Access Control Service (UAC) products offers a web service.
However, it does not filter received data before inserting them in
generated HTML documents.
An attacker can therefore trigger a Cross Site Scripting of Junos
Pulse SSL VPN/UAC, in order to execute JavaScript code in the
context of the web site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Junos-Pulse-SSL-VPN-UAC-Cross-Site-Scripting-15330