A specific script in the Junos Space web application allows attacker-controlled input from a GET request without sufficient input sanitization. A specially crafted request can exploit this vulnerability to execute arbitrary shell commands on the Junos Space Appliance.
This issue affects Junos Space 24.1R1. Previous versions of Junos Space are unaffected by this vulnerability.
Metrics
Affected Vendors & Products
Solution
The following software releases have been updated to resolve this specific issue: Junos Space 24.1R1 Patch V1, and all subsequent releases.
Workaround
Use access lists or firewall filters to limit access to the device's web interface only from trusted hosts.
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA88110 |
![]() ![]() |
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Juniper
Juniper junos Space |
|
CPEs | cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:* | |
Vendors & Products |
Juniper
Juniper junos Space |
|
Metrics |
ssvc
|
Fri, 11 Oct 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Command Injection vulnerability in Juniper Networks Junos Space allows an unauthenticated, network-based attacker sending a specially crafted request to execute arbitrary shell commands on the Junos Space Appliance, leading to remote command execution by the web application, gaining complete control of the device. A specific script in the Junos Space web application allows attacker-controlled input from a GET request without sufficient input sanitization. A specially crafted request can exploit this vulnerability to execute arbitrary shell commands on the Junos Space Appliance. This issue affects Junos Space 24.1R1. Previous versions of Junos Space are unaffected by this vulnerability. | |
Title | Junos Space: Remote Command Execution (RCE) vulnerability in web application | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-10-11T18:03:20.129Z
Reserved: 2024-06-25T15:12:53.249Z
Link: CVE-2024-39563

Updated: 2024-10-11T18:03:12.576Z

Status : Awaiting Analysis
Published: 2024-10-11T16:15:07.740
Modified: 2024-10-15T12:58:51.050
Link: CVE-2024-39563

No data.

No data.