Description
A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to disclose sensitive information in the HTTP response which allows the attacker to obtain sensitive information.
Published: 2021-10-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The following software releases have been updated to resolve this specific issue: 4.12.0R5, 4.13.0R3, and all subsequent releases.


Vendor Workaround

There are no viable workarounds for this issue. To reduce the risk of exploitation utilize common security BCPs to limit the exploitable surface by limiting access to network and device to trusted systems, administrators, networks and hosts.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-18290 A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to disclose sensitive information in the HTTP response which allows the attacker to obtain sensitive information.
References
History

No history.

Subscriptions

Juniper Session And Resource Control
cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T18:28:42.778Z

Reserved: 2021-04-15T00:00:00.000Z

Link: CVE-2021-31380

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-19T19:15:11.133

Modified: 2024-11-21T06:05:33.857

Link: CVE-2021-31380

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.