cve-2020-1611
Vulnerability from cvelistv5
Published
2020-01-15 08:40
Modified
2024-09-16 16:32
Severity ?
EPSS score ?
Summary
A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
References
▼ | URL | Tags | |
---|---|---|---|
sirt@juniper.net | https://kb.juniper.net/JSA10993 | Vendor Advisory | |
sirt@juniper.net | https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1449224 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/JSA10993 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1449224 | Permissions Required |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos Space |
Version: unspecified < 19.4R1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:39:10.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10993" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://prsearch.juniper.net/InfoCenter/index?page=prcontent\u0026id=PR1449224" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Junos Space", "vendor": "Juniper Networks", "versions": [ { "lessThan": "19.4R1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Local file inclusion", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-15T08:40:38", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10993" }, { "tags": [ "x_refsource_MISC" ], "url": "https://prsearch.juniper.net/InfoCenter/index?page=prcontent\u0026id=PR1449224" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos Space 19.4R1, and all subsequent releases." } ], "source": { "advisory": "JSA10993", "defect": [ "1449224" ], "discovery": "INTERNAL" }, "title": "Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device.", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation of these issues, use access lists or firewall filters to limit access to Junos Space to only trusted administrative networks, hosts and users." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2020-01-08T17:00:00.000Z", "ID": "CVE-2020-1611", "STATE": "PUBLIC", "TITLE": "Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos Space", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "19.4R1" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Local file inclusion" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10993", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10993" }, { "name": "https://prsearch.juniper.net/InfoCenter/index?page=prcontent\u0026id=PR1449224", "refsource": "MISC", "url": "https://prsearch.juniper.net/InfoCenter/index?page=prcontent\u0026id=PR1449224" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos Space 19.4R1, and all subsequent releases." } ], "source": { "advisory": "JSA10993", "defect": [ "1449224" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation of these issues, use access lists or firewall filters to limit access to Junos Space to only trusted administrative networks, hosts and users." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2020-1611", "datePublished": "2020-01-15T08:40:38.352672Z", "dateReserved": "2019-11-04T00:00:00", "dateUpdated": "2024-09-16T16:32:34.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-1611\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2020-01-15T09:15:12.857\",\"lastModified\":\"2024-11-21T05:10:57.800\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de Inclusi\u00f3n de Archivo Local en Juniper Networks Junos Space, permite a un atacante visualizar todos los archivos en el destino cuando el dispositivo recibe paquetes HTTP maliciosos. Este problema afecta a: Juniper Networks Junos Space versiones anteriores a 19.4R1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:17.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DFF54CC-E24F-42B4-B908-AECD1139146B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:17.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E80FD6E-A2E7-4B8C-BFC8-D9B0F32245C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:18.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"58BFEC5C-5F42-4222-8B5B-AAC9466AEC94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:18.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7BA0A62-CEBF-4B19-AB8C-AB29209EC59E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:18.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C64B73-6631-4369-9CC3-8CE4EDB7A790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:18.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD163C75-D934-4960-9834-8BA2A0218A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:19.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"222D409D-F0C5-4B52-84FC-D199A00A7ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:19.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"34CAC9C5-05C5-4027-A011-6EAA3DC5DB03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_space:19.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04B6957-6526-4387-B146-8D9A11943F59\"}]}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA10993\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://prsearch.juniper.net/InfoCenter/index?page=prcontent\u0026id=PR1449224\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://kb.juniper.net/JSA10993\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://prsearch.juniper.net/InfoCenter/index?page=prcontent\u0026id=PR1449224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.