Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-46gw-g4gv-v5gw

Опубликовано: 09 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.1
CVSS3: 6.5

Описание

An arbitrary file download vulnerability in the web interface of Juniper Networks Junos Space allows a network-based authenticated attacker using a crafted GET method to access any file on the file system. Using specially crafted GET methods, an attacker can gain access to files beyond the file path normally allowed by the JBoss daemon. These files could contain sensitive information restricted from access by low-privileged users.This issue affects all versions of Junos Space before 24.1R3.

An arbitrary file download vulnerability in the web interface of Juniper Networks Junos Space allows a network-based authenticated attacker using a crafted GET method to access any file on the file system. Using specially crafted GET methods, an attacker can gain access to files beyond the file path normally allowed by the JBoss daemon. These files could contain sensitive information restricted from access by low-privileged users.This issue affects all versions of Junos Space before 24.1R3.

EPSS

Процентиль: 14%
0.00046
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-552

Связанные уязвимости

CVSS3: 6.5
nvd
4 месяца назад

An arbitrary file download vulnerability in the web interface of Juniper Networks Junos Space allows a network-based authenticated attacker using a crafted GET method to access any file on the file system. Using specially crafted GET methods, an attacker can gain access to files beyond the file path normally allowed by the JBoss daemon. These files could contain sensitive information restricted from access by low-privileged users.This issue affects all versions of Junos Space before 24.1R3.

EPSS

Процентиль: 14%
0.00046
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-552