Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1607— Junos OS: Cross-Site Scripting (XSS) in J-Web

CVSS 7.5 · High EPSS 0.34% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1607

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: Cross-Site Scripting (XSS) in J-Web
Source: NVD (National Vulnerability Database)
Vulnerability Description
Insufficient Cross-Site Scripting (XSS) protection in J-Web may potentially allow a remote attacker to inject web script or HTML, hijack the target user's J-Web session and perform administrative actions on the Junos device as the targeted user. This issue affects Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15; 12.3X48 versions prior to 12.3X48-D86, 12.3X48-D90 on SRX Series; 14.1X53 versions prior to 14.1X53-D51 on EX and QFX Series; 15.1F6 versions prior to 15.1F6-S13; 15.1 versions prior to 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190 on SRX Series; 15.1X53 versions prior to 15.1X53-D238 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D592 on EX2300/EX3400 Series; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R1-S9, 17.2R3-S2; 17.3 versions prior to 17.3R2-S5, 17.3R3-S5; 17.4 versions prior to 17.4R2-S6, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R2-S5, 18.2R3; 18.3 versions prior to 18.3R1-S6, 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R1-S5, 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS J-Web 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS中的J-Web存在跨站脚本漏洞。远程攻击者可利用该漏洞注入Web脚本或HTML,劫持用户的J-Web会话并执行管理操作。以下产品及版本受到影响:Juniper Networks Junos OS 12.3版本,12.3X48版本,14.1X53版本,15.1版
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 17.2R2 -
Juniper NetworksJunos OS 12.3X48 ~ 12.3X48-D86, 12.3X48-D90 -
Juniper NetworksJunos OS 14.1X53 ~ 14.1X53-D51 -
Juniper NetworksJunos OS 15.1X53 ~ 15.1X53-D238 -
Juniper NetworksJunos OS 15.1X53 ~ 15.1X53-D592 -

II. Public POCs for CVE-2020-1607

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1607

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2020-01-15 · 11 CVEs total

CVE-2020-16058.8 HIGHJunos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafte
CVE-2020-16098.8 HIGHJunos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafte
CVE-2020-16038.6 HIGHJunos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel cra
CVE-2020-16087.5 HIGHJunos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet caus
CVE-2020-16027.1 HIGHJunos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafte
CVE-2020-16006.5 MEDIUMJunos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RP
CVE-2020-16046.5 MEDIUMJunos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to e
CVE-2020-16116.5 MEDIUMJunos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all file
CVE-2020-16065.4 MEDIUMJunos OS: Path traversal vulnerability in J-Web
CVE-2020-16015.3 MEDIUMJunos OS: Upon receipt of certain types of malformed PCEP packets the pccd process may cra

IV. Related Vulnerabilities

V. Comments for CVE-2020-1607

No comments yet


Leave a comment