JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0077 JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.
Github GHSA Github GHSA GHSA-qc55-vm3j-74gp JSNAPy allows unprivileged local users to alter files under the directory
Fixes

Solution

This issue is resolved in 1.3.0 and subsequent releases. Fixed JSNAPy releases can be downloaded from https://github.com/Juniper/jsnapy/releases.


Workaround

The workaround is to change the related files and directory to group/world to readable, but not writable: # sudo chmod -R og-w /etc/jsnapy # ls -l /etc/jsnapy/ total 20 -rwxr-xr-x 1 root root 387 Aug 9 2016 jsnapy.cfg -rwxr-xr-x 1 root root 1695 Aug 9 2016 logging.yml drwxr-xr-x 2 root root 4096 Aug 26 2016 samples drwxr-xr-x 2 root root 4096 Aug 26 2016 snapshots drwxr-xr-x 2 root root 4096 Aug 26 2016 testfiles

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T16:13:34.223Z

Reserved: 2017-11-16T00:00:00

Link: CVE-2018-0023

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-11T19:29:00.697

Modified: 2024-11-21T03:37:22.880

Link: CVE-2018-0023

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.