No analysis available yet.
Vendor Solution
The following software releases have been updated to resolve this specific issue: 4.12.0R5, 4.13.0R3, and all subsequent releases.
Vendor Workaround
There are no viable workarounds for this issue. To reduce the risk of exploitation utilize common security BCPs to limit the exploitable surface by limiting access to network and device to trusted systems, administrators, networks and hosts.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-18290 | A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to disclose sensitive information in the HTTP response which allows the attacker to obtain sensitive information. |
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA11248 |
|
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T18:28:42.778Z
Reserved: 2021-04-15T00:00:00.000Z
Link: CVE-2021-31380
No data.
Status : Modified
Published: 2021-10-19T19:15:11.133
Modified: 2024-11-21T06:05:33.857
Link: CVE-2021-31380
No data.
OpenCVE Enrichment
No data.
EUVD