Very High
Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device.
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device.
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
Add Assessment
Ratings
-
Attacker ValueVery High
-
ExploitabilityVery High
Technical Analysis
This is a low-risk, high-gain vulnerability, exploiting a path inclusion (which is basically on the same impact as the Citrix ADC (Netscaler) path traversal bug). Though it’s probably less likely to find these sitting on the public internet.
PoC from Jin Wook Kim
@wugeej
https://twitter.com/wugeej/status/1222762164626186242
[PoC] Juniper Junos Space Local File Inclusion (CVE-2020-1611) - GET Param: (1) Set "Format" to "txt" (2) Set "FileUrl" to a local path - /ect/passwd GET /mainui/download?X-CSRF=Y581SFvK....53107455361&FileUrl=/etc/passwd&Format=txt&nod... HTTP/1.1
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportRatings
-
Attacker ValueVery High
-
ExploitabilityVery High
Technical Analysis
The vulnerability allows a malicious actor access to any files within the system via a local file inclusion. This isn’t a vulnerability that requires a heap of knowledge, just enough to craft the http request. It’s also vulnerable in a series of versions prior to the release of 19.4R1. Though these systems aren’t commonly found.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- juniper
Products
- junos space 17.1,
- junos space 17.2,
- junos space 18.1,
- junos space 18.2,
- junos space 18.3,
- junos space 18.4,
- junos space 19.1,
- junos space 19.2,
- junos space 19.3
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: