目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2022-22229— Juniper Networks Paragon Active Assurance 跨站脚本漏洞

CVSS 8.4 · High EPSS 0.66% · P71
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2022-22229の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Paragon Active Assurance (Formerly Netrounds): Stored Cross-site Scripting (XSS) vulnerability in web administration
ソース: NVD (National Vulnerability Database)
脆弱性説明
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Juniper Networks Paragon Active Assurance 跨站脚本漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Juniper Networks Paragon Active Assurance是美国瞻博网络(Juniper Networks)公司的一种可编程的测试和服务保证解决方案。使用基于软件和流量生成的测试代理,可作为 SaaS 解决方案从云中轻松使用和交付,或在 NFV 环境中本地部署。 Juniper Networks Paragon Active Assurance(Netrounds)3.1.1 之前的版本、3.2.1 之前的3.2 版本存在安全漏洞,该漏洞源于控制中心控制器网页中允许高权限攻击者具有
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Juniper NetworksParagon Active Assurance (Formerly Netrounds) unspecified ~ 3.1.1 -

II. CVE-2022-22229の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2022-22229のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2022-10-18 · 36 CVEs total

CVE-2022-222398.2 HIGHJunos OS Evolved: The ssh CLI command always runs as root which can lead to privilege esca
CVE-2022-222418.1 HIGHJunos OS: Vulnerability in J-Web may allow deserialization without authentication
CVE-2022-222517.8 HIGHcSRX Series: Storing Passwords in a Recoverable Format and software permissions issues all
CVE-2022-222327.5 HIGHSRX Series: If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled
CVE-2022-222317.5 HIGHSRX Series: If UTM Enhanced Content Filtering and AntiVirus are enabled, and specific traf
CVE-2022-222367.5 HIGHJunos OS: SRX Series and MX Series: When specific valid SIP packets are received the PFE w
CVE-2022-222287.5 HIGHJunos OS: IPv6 OAM SRv6 network-enabled devices are vulnerable to Denial of Service (DoS)
CVE-2022-222187.5 HIGHJunos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash duri
CVE-2022-222117.5 HIGHJunos OS Evolved: PTX Series: Multiple FPCs become unreachable due to continuous polling o
CVE-2022-222017.5 HIGHSRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, th
CVE-2022-222467.5 HIGHJunos OS: PHP file inclusion vulnerability in J-Web
CVE-2022-222477.5 HIGHJunos OS Evolved: Kernel processing of unvalidated TCP segments could lead to a Denial of
CVE-2022-221927.5 HIGHJunos OS Evolved: PTX Series: An attacker can cause a kernel panic by sending a malformed
CVE-2022-222487.3 HIGHJunos OS Evolved: Incorrect file permissions can allow low-privileged user to cause anothe
CVE-2022-222236.5 MEDIUMJunos OS: QFX10000 Series: In IP/MPLS PHP node scenarios upon receipt of certain crafted p
CVE-2022-222246.5 MEDIUMJunos OS and Junos OS Evolved: PPMD goes into infinite loop upon receipt of malformed OSPF
CVE-2022-222266.5 MEDIUMJunos OS: EX4300-MP, EX4600, QFX5000 Series: In VxLAN scenarios specific packets processed
CVE-2022-222306.5 MEDIUMJunos OS and Junos OS Evolved: RPD crash upon receipt of specific OSPFv3 LSAs
CVE-2022-222506.5 MEDIUMJunos OS and Junos OS Evolved: An FPC crash might be seen due to an EVPN MAC entry moving
CVE-2022-222376.5 MEDIUMJunos OS: Peers not configured for TCP-AO can establish a BGP or LDP session even if authe

Showing 20 of 36 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2022-22229へのコメント

まだコメントはありません


コメントを残す