Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9xg8-vx2w-7c89

Опубликовано: 11 июл. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 7.7
CVSS3: 8.8

Описание

An Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in J-Web shipped with Juniper Networks Junos OS allows an unauthenticated, network-based attacker to execute remote commands on the target device. 

While an administrator is logged into a J-Web session or has previously logged in and subsequently logged out of their J-Web session, the attacker can arbitrarily execute commands on the target device with the other user's credentials. In the worst case, the attacker will have full control over the device. This issue affects Junos OS: 

  • All versions before 21.2R3-S8, 
  • from 21.4 before 21.4R3-S7,
  • from 22.2 before 22.2R3-S4,
  • from 22.3 before 22.3R3-S3,
  • from 22.4 before 22.4R3-S2,
  • from 23.2 before 23.2R2,
  • from 23.4 before 23.4R1-S1, 23.4R2.

An Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in J-Web shipped with Juniper Networks Junos OS allows an unauthenticated, network-based attacker to execute remote commands on the target device. 

While an administrator is logged into a J-Web session or has previously logged in and subsequently logged out of their J-Web session, the attacker can arbitrarily execute commands on the target device with the other user's credentials. In the worst case, the attacker will have full control over the device. This issue affects Junos OS: 

  • All versions before 21.2R3-S8, 
  • from 21.4 before 21.4R3-S7,
  • from 22.2 before 22.2R3-S4,
  • from 22.3 before 22.3R3-S3,
  • from 22.4 before 22.4R3-S2,
  • from 23.2 before 23.2R2,
  • from 23.4 before 23.4R1-S1, 23.4R2.

EPSS

Процентиль: 70%
0.00637
Низкий

7.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-643

Связанные уязвимости

CVSS3: 8.8
nvd
больше 1 года назад

An Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in J-Web shipped with Juniper Networks Junos OS allows an unauthenticated, network-based attacker to execute remote commands on the target device.  While an administrator is logged into a J-Web session or has previously logged in and subsequently logged out of their J-Web session, the attacker can arbitrarily execute commands on the target device with the other user's credentials. In the worst case, the attacker will have full control over the device. This issue affects Junos OS:  * All versions before 21.2R3-S8,  * from 21.4 before 21.4R3-S7, * from 22.2 before 22.2R3-S4, * from 22.3 before 22.3R3-S3, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2, * from 23.4 before 23.4R1-S1, 23.4R2.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость веб-интерфейса управления J-Web операционных систем Juniper Networks Junos OS, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 70%
0.00637
Низкий

7.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-643