J-Security Center

Title: SCT Campus Pipeline Render.UserLayoutRootNode.uP Cross-Site Scripting Vulnerability

Severity: MODERATE


Campus Pipeline is an integrated web based information management system including web based portals, email interfaces and calendar applications. It is commercially available for Unix and Unix variants as well as Microsoft Windows.

Campus Pipeline is affected by a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied URI input.

The problem presents itself when malicious HTML and script code is sent to the 'render.UserLayoutRootNode.uP' script through the 'utf' URI parameter.

This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

Affected Products:

  • SCT Corporation Campus Pipeline 1.0.0
  • SCT Corporation Campus Pipeline 2.0.0
  • SCT Corporation Campus Pipeline 2.1.0
  • SCT Corporation Campus Pipeline 2.2.0
  • SCT Corporation Campus Pipeline 3.0.0
  • SCT Corporation Campus Pipeline 3.1.0
  • SCT Corporation Campus Pipeline 3.2.0


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.