Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2888 | The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an attacker to perform a number of different malicious actions against a target device when a user is authenticated to J-Web. An attacker may be able to supersede existing parameters, including hardcoded parameters within the HTTP/S session, access and exploit variables, bypass web application firewall rules or input validation mechanisms, and otherwise alter and modify J-Web's normal behavior. An attacker may be able to transition victims to malicious web services, or exfiltrate sensitive information from otherwise secure web forms. This issue affects: Juniper Networks Junos OS: All versions prior to 17.4R3-S3; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2. |
Solution
The following software releases have been updated to resolve this specific issue: 17.4R3-S3, 18.1R3-S12, 18.2R3-S6, 18.3R3-S4, 18.4R3-S6, 19.1R3-S4, 19.2R3-S1, 19.3R3-S1, 19.4R2-S2, 19.4R3, 20.1R2, 20.2R2, 20.3R1, and all subsequent releases.
Workaround
To reduce the risk of exploitation utilize common security BCPs to limit the exploitable surface by limiting access to network and device to trusted systems, administrators, networks and hosts. Access the J-Web service from trusted hosts which may not be compromised by cross-site scripting attacks, for example, deploying jump hosts with no internet access. Alternatively, disable J-Web.
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA11160 |
|
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T01:12:12.544Z
Reserved: 2020-10-27T00:00:00
Link: CVE-2021-0269
No data.
Status : Modified
Published: 2021-04-22T20:15:09.980
Modified: 2024-11-21T05:42:21.877
Link: CVE-2021-0269
No data.
OpenCVE Enrichment
No data.
EUVD