A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives.
This issue affects Juniper Networks Junos OS on SRX Series and EX Series:
* All versions earlier than 20.4R3-S10;
* 21.2 versions earlier than 21.2R3-S8;
* 21.4 versions earlier than 21.4R3-S6;
* 22.1 versions earlier than 22.1R3-S5;
* 22.2 versions earlier than 22.2R3-S3;
* 22.3 versions earlier than 22.3R3-S2;
* 22.4 versions earlier than 22.4R3-S1;
* 23.2 versions earlier than 23.2R2;
* 23.4 versions earlier than 23.4R2.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction Required
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.0048.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Juniper
Subscribe
|
Ex2200
Subscribe
Ex2200-c
Subscribe
Ex2200-vc
Subscribe
Ex2300
Subscribe
Ex2300-24mp
Subscribe
Ex2300-24p
Subscribe
Ex2300-24t
Subscribe
Ex2300-48mp
Subscribe
Ex2300-48p
Subscribe
Ex2300-48t
Subscribe
Ex2300-c
Subscribe
Ex2300 Multigigabit
Subscribe
Ex2300m
Subscribe
Ex3200
Subscribe
Ex3300
Subscribe
Ex3300-vc
Subscribe
Ex3400
Subscribe
Ex4100
Subscribe
Ex4100-f
Subscribe
Ex4100 Multigigabit
Subscribe
Ex4200
Subscribe
Ex4200-vc
Subscribe
Ex4300
Subscribe
Ex4300-24p
Subscribe
Ex4300-24p-s
Subscribe
Ex4300-24t
Subscribe
Ex4300-24t-s
Subscribe
Ex4300-32f
Subscribe
Ex4300-32f-dc
Subscribe
Ex4300-32f-s
Subscribe
Ex4300-48mp
Subscribe
Ex4300-48mp-s
Subscribe
Ex4300-48p
Subscribe
Ex4300-48p-s
Subscribe
Ex4300-48t
Subscribe
Ex4300-48t-afi
Subscribe
Ex4300-48t-dc
Subscribe
Ex4300-48t-dc-afi
Subscribe
Ex4300-48t-s
Subscribe
Ex4300-48tafi
Subscribe
Ex4300-48tdc
Subscribe
Ex4300-48tdc-afi
Subscribe
Ex4300-mp
Subscribe
Ex4300-vc
Subscribe
Ex4300 Multigigabit
Subscribe
Ex4300m
Subscribe
Ex4400
Subscribe
Ex4400-24x
Subscribe
Ex4400 Multigigabit
Subscribe
Ex4500
Subscribe
Ex4500-vc
Subscribe
Ex4550
Subscribe
Ex4550-vc
Subscribe
Ex4550\/vc
Subscribe
Ex4600
Subscribe
Ex4600-vc
Subscribe
Ex4650
Subscribe
Ex6200
Subscribe
Ex6210
Subscribe
Ex8200
Subscribe
Ex8200-vc
Subscribe
Ex8208
Subscribe
Ex8216
Subscribe
Ex9200
Subscribe
Ex9204
Subscribe
Ex9208
Subscribe
Ex9214
Subscribe
Ex9250
Subscribe
Ex9251
Subscribe
Ex9253
Subscribe
Ex Redundant Power System
Subscribe
Ex Rps
Subscribe
Junos
Subscribe
Srx100
Subscribe
Srx110
Subscribe
Srx1400
Subscribe
Srx1500
Subscribe
Srx1600
Subscribe
Srx210
Subscribe
Srx220
Subscribe
Srx2300
Subscribe
Srx240
Subscribe
Srx240h2
Subscribe
Srx240m
Subscribe
Srx300
Subscribe
Srx320
Subscribe
Srx340
Subscribe
Srx3400
Subscribe
Srx345
Subscribe
Srx3600
Subscribe
Srx380
Subscribe
Srx4000
Subscribe
Srx4100
Subscribe
Srx4200
Subscribe
Srx4300
Subscribe
Srx4600
Subscribe
Srx4700
Subscribe
Srx5000
Subscribe
Srx5400
Subscribe
Srx550
Subscribe
Srx550 Hm
Subscribe
Srx550m
Subscribe
Srx5600
Subscribe
Srx5800
Subscribe
Srx650
Subscribe
|
Configuration 1 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19268 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator. A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S10; * 21.2 versions earlier than 21.2R3-S8; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3-S1; * 23.2 versions earlier than 23.2R2; * 23.4 versions earlier than 23.4R2. |
Solution
The following software releases have been updated to resolve this specific issue: 20.4R3-S10*, 21.2R3-S8*, 21.4R3-S6*, 22.1R3-S5*, 22.2R3-S3*, 22.3R3-S2*, 22.4R3-S1*, 23.2R2*, 23.4R2*, 24.2R1*, and all subsequent releases. * Pending Publication
Workaround
Disable J-Web, or limit access to only trusted hosts and users.
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA76390 |
|
Thu, 29 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-05-29T15:18:51.087Z
Reserved: 2023-12-27T19:38:25.710Z
Link: CVE-2024-21620
Updated: 2024-08-01T22:27:35.367Z
Status : Modified
Published: 2024-01-25T23:15:09.680
Modified: 2024-11-21T08:54:44.457
Link: CVE-2024-21620
No data.
OpenCVE Enrichment
No data.
EUVD