Published:2020/01/10  Last Updated:2020/01/10

JVN#07375820
Junos OS vulnerable to directory traversal

Overview

Junos OS provided by Juniper Networks, Inc. contains a directory traversal vulnerability.

Products Affected

  • Junos OS 12.3 versions prior to 12.3R12-S13
  • Junos OS 12.3X48 versions prior to 12.3X48-D85 on SRX Series
  • Junos OS 14.1X53 versions prior to 14.1X53-D51
  • Junos OS 15.1F6 versions prior to 15.1F6-S13
  • Junos OS 15.1 versions prior to 15.1R7-S5
  • Junos OS 15.1X49 versions prior to 15.1X49-D180 on SRX Series
  • Junos OS 15.1X53 versions prior to 15.1X53-D238 on QFX5200/QFX5110 Series
  • Junos OS 16.1 versions prior to 16.1R4-S13, 16.1R7-S5
  • Junos OS 16.2 versions prior to 16.2R2-S10
  • Junos OS 17.1 versions prior to 17.1R3-S1
  • Junos OS 17.2 versions prior to 17.2R1-S9, 17.2R3-S2
  • Junos OS 17.3 versions prior to 17.3R2-S5, 17.3R3-S5
  • Junos OS 17.4 versions prior to 17.4R2-S9, 17.4R3
  • Junos OS 18.1 versions prior to 18.1R3-S8
  • Junos OS 18.2 versions prior to 18.2R3
  • Junos OS 18.3 versions prior to 18.3R2-S3, 18.3R3
  • Junos OS 18.4 versions prior to 18.4R2
  • Junos OS 19.1 versions prior to 19.1R1-S4, 19.1R

Description

Junos OS contains a directory traversal vulnerability (CWE-22).

Impact

Files on the server may be viewed or deleted by an authenticated J-web user.

According to the developer, this issue does not affect system files that can be accessed only by root user.

Solution

Update the Software
Update the software to the latest version according to the information provided by the developer.

Apply a Workaround
Applying a workaround listed below may mitigate the impacts of the vulnerability.

  • Limit access to the J-Web interface to only trusted users

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Base Score: 5.4
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:L/Au:S/C:P/I:P/A:N
Base Score: 5.5
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2020-1606
JVN iPedia JVNDB-2020-000002