ID

VAR-201409-0548


CVE

CVE-2014-3820


TITLE

Juniper Junos Pulse Secure Access Service and Juniper Junos Pulse Access Control Service Device cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2014-004482

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the SSL VPN/UAC web server in the Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 7.1 before 7.1r16, 7.4 before 7.4r3, and 8.0 before 8.0r1 and the Juniper Junos Pulse Access Control Service devices with UAC OS 4.1 before 4.1r8, 4.4 before 4.4r3 and 5.0 before 5.0r1 allows remote administrators to inject arbitrary web script or HTML via unspecified vectors. Juniper Junos Pulse Secure Access is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. The former is a client that supports remote and mobile users to access corporate resources with various Web devices. The latter is a standards-based, scalable network access control solution. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML

Trust: 1.98

sources: NVD: CVE-2014-3820 // JVNDB: JVNDB-2014-004482 // BID: 69801 // VULHUB: VHN-71760

AFFECTED PRODUCTS

vendor:junipermodel:junos pulse access control servicescope:eqversion:4.1r5

Trust: 1.6

vendor:junipermodel:junos pulse access control servicescope:eqversion:5.0

Trust: 1.6

vendor:junipermodel:junos pulse access control servicescope:eqversion:4.1r3

Trust: 1.6

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r5

Trust: 1.6

vendor:junipermodel:junos pulse secure access servicescope:eqversion:8.0

Trust: 1.6

vendor:junipermodel:junos pulse access control servicescope:eqversion:4.1r2

Trust: 1.6

vendor:junipermodel:junos pulse access control servicescope:eqversion:4.4

Trust: 1.6

vendor:junipermodel:junos pulse access control servicescope:eqversion:4.1r4

Trust: 1.6

vendor:junipermodel:junos pulse access control servicescope:eqversion:4.1r1.1

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r13

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r10

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r14

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1

Trust: 1.0

vendor:junipermodel:junos pulse access control servicescope:eqversion:4.1r1

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r8

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r1.1

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r7

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r12

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.4

Trust: 1.0

vendor:junipermodel:junos pulse access control servicescope:eqversion:4.1

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r4

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r2

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r3

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r6

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r15

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r11

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r1

Trust: 1.0

vendor:junipermodel:junos pulse secure access servicescope:eqversion:7.1r9

Trust: 1.0

vendor:junipermodel:ic4000scope: - version: -

Trust: 0.8

vendor:junipermodel:junos pulse secure access servicescope:eqversion:(ive os) 8.0r1

Trust: 0.8

vendor:junipermodel:junos pulse secure access servicescope:ltversion:7.4

Trust: 0.8

vendor:junipermodel:secure access 700scope: - version: -

Trust: 0.8

vendor:junipermodel:fips secure access 4000scope: - version: -

Trust: 0.8

vendor:junipermodel:junos pulse access control servicescope:ltversion:4.1

Trust: 0.8

vendor:junipermodel:secure access 6500scope: - version: -

Trust: 0.8

vendor:junipermodel:fips secure access 6000scope: - version: -

Trust: 0.8

vendor:junipermodel:junos pulse secure access servicescope:eqversion:(ive os) 7.4r3

Trust: 0.8

vendor:junipermodel:junos pulse access control servicescope:ltversion:5.0

Trust: 0.8

vendor:junipermodel:junos pulse secure access servicescope:ltversion:8.0

Trust: 0.8

vendor:junipermodel:junos pulse secure access servicescope:ltversion:7.1

Trust: 0.8

vendor:junipermodel:ic6000scope: - version: -

Trust: 0.8

vendor:junipermodel:mag4610 gatewayscope: - version: -

Trust: 0.8

vendor:junipermodel:ic4500scope: - version: -

Trust: 0.8

vendor:junipermodel:mag2600 gatewayscope: - version: -

Trust: 0.8

vendor:junipermodel:mag6611 gatewayscope: - version: -

Trust: 0.8

vendor:junipermodel:secure access 4500scope: - version: -

Trust: 0.8

vendor:junipermodel:ic6500 fipsscope: - version: -

Trust: 0.8

vendor:junipermodel:mag6610 gatewayscope: - version: -

Trust: 0.8

vendor:junipermodel:junos pulse access control servicescope:eqversion:(uac os) 5.0r1

Trust: 0.8

vendor:junipermodel:fips secure access 6500scope: - version: -

Trust: 0.8

vendor:junipermodel:junos pulse access control servicescope:ltversion:4.4

Trust: 0.8

vendor:junipermodel:ic6500scope: - version: -

Trust: 0.8

vendor:junipermodel:secure access 2500scope: - version: -

Trust: 0.8

vendor:junipermodel:junos pulse secure access servicescope:eqversion:(ive os) 7.1r16

Trust: 0.8

vendor:junipermodel:junos pulse access control servicescope:eqversion:(uac os) 4.1r8

Trust: 0.8

vendor:junipermodel:fips secure access 4500scope: - version: -

Trust: 0.8

vendor:junipermodel:junos pulse access control servicescope:eqversion:(uac os) 4.4r8

Trust: 0.8

vendor:junipermodel:sa700scope:eqversion:0

Trust: 0.3

vendor:junipermodel:sa6500scope:eqversion:0

Trust: 0.3

vendor:junipermodel:sa6000scope:eqversion:0

Trust: 0.3

vendor:junipermodel:sa4500scope:eqversion:0

Trust: 0.3

vendor:junipermodel:sa4000scope:eqversion:0

Trust: 0.3

vendor:junipermodel:sa2500scope:eqversion:0

Trust: 0.3

vendor:junipermodel:sa2000scope:eqversion:0

Trust: 0.3

vendor:junipermodel:mag6611scope:eqversion:0

Trust: 0.3

vendor:junipermodel:mag6610scope:eqversion:0

Trust: 0.3

vendor:junipermodel:mag4610scope:eqversion:0

Trust: 0.3

vendor:junipermodel:mag2600scope:eqversion:0

Trust: 0.3

vendor:junipermodel:ive osscope:eqversion:8.0

Trust: 0.3

vendor:junipermodel:ive osscope:eqversion:7.4

Trust: 0.3

vendor:junipermodel:ive osscope:eqversion:7.1

Trust: 0.3

vendor:junipermodel:fips sa6500scope:eqversion:0

Trust: 0.3

vendor:junipermodel:fips sa6000scope:eqversion:0

Trust: 0.3

vendor:junipermodel:fips sa4500scope:eqversion:0

Trust: 0.3

vendor:junipermodel:fips sa4000scope:eqversion:0

Trust: 0.3

vendor:junipermodel:uac os 5.0r1scope:neversion: -

Trust: 0.3

vendor:junipermodel:uac os 4.4r3scope:neversion: -

Trust: 0.3

vendor:junipermodel:uac os 4.1r8.1scope:neversion: -

Trust: 0.3

vendor:junipermodel:ive os 8.0r1scope:neversion: -

Trust: 0.3

vendor:junipermodel:ive os 7.4r3scope:neversion: -

Trust: 0.3

vendor:junipermodel:ive os 7.1r16scope:neversion: -

Trust: 0.3

sources: BID: 69801 // JVNDB: JVNDB-2014-004482 // CNNVD: CNNVD-201409-992 // NVD: CVE-2014-3820

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3820
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-3820
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201409-992
value: MEDIUM

Trust: 0.6

VULHUB: VHN-71760
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-3820
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-71760
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71760 // JVNDB: JVNDB-2014-004482 // CNNVD: CNNVD-201409-992 // NVD: CVE-2014-3820

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-71760 // JVNDB: JVNDB-2014-004482 // NVD: CVE-2014-3820

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201409-992

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201409-992

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004482

PATCH

title:JSA10645url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10645

Trust: 0.8

sources: JVNDB: JVNDB-2014-004482

EXTERNAL IDS

db:NVDid:CVE-2014-3820

Trust: 2.8

db:JUNIPERid:JSA10645

Trust: 2.0

db:SECTRACKid:1030852

Trust: 1.1

db:BIDid:69801

Trust: 1.0

db:JVNDBid:JVNDB-2014-004482

Trust: 0.8

db:CNNVDid:CNNVD-201409-992

Trust: 0.7

db:VULHUBid:VHN-71760

Trust: 0.1

sources: VULHUB: VHN-71760 // BID: 69801 // JVNDB: JVNDB-2014-004482 // CNNVD: CNNVD-201409-992 // NVD: CVE-2014-3820

REFERENCES

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10645

Trust: 1.6

url:http://www.securitytracker.com/id/1030852

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3820

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3820

Trust: 0.8

url:http://www.securityfocus.com/bid/69801

Trust: 0.6

url:http://www.juniper.net/

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10645&cat=sirt_1&actp=list

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10645

Trust: 0.1

sources: VULHUB: VHN-71760 // BID: 69801 // JVNDB: JVNDB-2014-004482 // CNNVD: CNNVD-201409-992 // NVD: CVE-2014-3820

CREDITS

The vendor reported this issue.

Trust: 0.9

sources: BID: 69801 // CNNVD: CNNVD-201409-992

SOURCES

db:VULHUBid:VHN-71760
db:BIDid:69801
db:JVNDBid:JVNDB-2014-004482
db:CNNVDid:CNNVD-201409-992
db:NVDid:CVE-2014-3820

LAST UPDATE DATE

2025-04-13T23:14:43.526000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71760date:2016-04-01T00:00:00
db:BIDid:69801date:2014-09-12T00:00:00
db:JVNDBid:JVNDB-2014-004482date:2014-10-02T00:00:00
db:CNNVDid:CNNVD-201409-992date:2014-10-08T00:00:00
db:NVDid:CVE-2014-3820date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-71760date:2014-09-29T00:00:00
db:BIDid:69801date:2014-09-12T00:00:00
db:JVNDBid:JVNDB-2014-004482date:2014-10-02T00:00:00
db:CNNVDid:CNNVD-201409-992date:2014-09-28T00:00:00
db:NVDid:CVE-2014-3820date:2014-09-29T14:55:08.720