A Command Injection vulnerability in Juniper Networks Junos Space allows an unauthenticated, network-based attacker sending a specially crafted request to execute arbitrary shell commands on the Junos Space Appliance, leading to remote command execution by the web application, gaining complete control of the device. A specific script in the Junos Space web application allows attacker-controlled input from a GET request without sufficient input sanitization. A specially crafted request can exploit this vulnerability to execute arbitrary shell commands on the Junos Space Appliance. This issue affects Junos Space 24.1R1. Previous versions of Junos Space are unaffected by this vulnerability.
References
History

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Juniper
Juniper junos Space
CPEs cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*
Vendors & Products Juniper
Juniper junos Space
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 11 Oct 2024 15:45:00 +0000

Type Values Removed Values Added
Description A Command Injection vulnerability in Juniper Networks Junos Space allows an unauthenticated, network-based attacker sending a specially crafted request to execute arbitrary shell commands on the Junos Space Appliance, leading to remote command execution by the web application, gaining complete control of the device. A specific script in the Junos Space web application allows attacker-controlled input from a GET request without sufficient input sanitization. A specially crafted request can exploit this vulnerability to execute arbitrary shell commands on the Junos Space Appliance. This issue affects Junos Space 24.1R1. Previous versions of Junos Space are unaffected by this vulnerability.
Title Junos Space: Remote Command Execution (RCE) vulnerability in web application
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published: 2024-10-11T15:21:18.354Z

Updated: 2024-10-11T18:03:20.129Z

Reserved: 2024-06-25T15:12:53.249Z

Link: CVE-2024-39563

cve-icon Vulnrichment

Updated: 2024-10-11T18:03:12.576Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-11T16:15:07.740

Modified: 2024-10-15T12:58:51.050

Link: CVE-2024-39563

cve-icon Redhat

No data.