CVE-2020-1631

A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform local file inclusion (LFI) or path traversal. Using this vulnerability, an attacker may be able to inject commands into the httpd.log, read files with 'world' readable permission file or obtain J-Web session tokens. In the case of command injection, as the HTTP service runs as user 'nobody', the impact of this command injection is limited. (CVSS score 5.3, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) In the case of reading files with 'world' readable permission, in Junos OS 19.3R1 and above, the unauthenticated attacker would be able to read the configuration file. (CVSS score 5.9, vector CVSS:3.1/ AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) If J-Web is enabled, the attacker could gain the same level of access of anyone actively logged into J-Web. If an administrator is logged in, the attacker could gain administrator access to J-Web. (CVSS score 8.8, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) This issue only affects Juniper Networks Junos OS devices with HTTP/HTTPS services enabled. Junos OS devices with HTTP/HTTPS services disabled are not affected. If HTTP/HTTPS services are enabled, the following command will show the httpd processes: user@device> show system processes | match http 5260 - S 0:00.13 /usr/sbin/httpd-gk -N 5797 - I 0:00.10 /usr/sbin/httpd --config /jail/var/etc/httpd.conf To summarize: If HTTP/HTTPS services are disabled, there is no impact from this vulnerability. If HTTP/HTTPS services are enabled and J-Web is not in use, this vulnerability has a CVSS score of 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). If J-Web is enabled, this vulnerability has a CVSS score of 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Juniper SIRT has received a single report of this vulnerability being exploited in the wild. Out of an abundance of caution, we are notifying customers so they can take appropriate actions. Indicators of Compromise: The /var/log/httpd.log may have indicators that commands have injected or files being accessed. The device administrator can look for these indicators by searching for the string patterns "=*;*&" or "*%3b*&" in /var/log/httpd.log, using the following command: user@device> show log httpd.log | match "=*;*&|=*%3b*&" If this command returns any output, it might be an indication of malicious attempts or simply scanning activities. Rotated logs should also be reviewed, using the following command: user@device> show log httpd.log.0.gz | match "=*;*&|=*%3b*&" user@device> show log httpd.log.1.gz | match "=*;*&|=*%3b*&" Note that a skilled attacker would likely remove these entries from the local log file, thus effectively eliminating any reliable signature that the device had been attacked. This issue affects Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S16; 12.3X48 versions prior to 12.3X48-D101, 12.3X48-D105; 14.1X53 versions prior to 14.1X53-D54; 15.1 versions prior to 15.1R7-S7; 15.1X49 versions prior to 15.1X49-D211, 15.1X49-D220; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R3-S2 ; 18.4 version 18.4R2 and later versions; 19.1 versions prior to 19.1R1-S5, 19.1R3-S1; 19.1 version 19.1R2 and later versions; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2; 20.1 versions prior to 20.1R1-S1, 20.1R2.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
juniperCNA
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
juniperjunos
12.3
juniperjunos
12.3:r1
juniperjunos
12.3:r10
juniperjunos
12.3:r10-s1
juniperjunos
12.3:r10-s2
juniperjunos
12.3:r11
juniperjunos
12.3:r12
juniperjunos
12.3:r12-s1
juniperjunos
12.3:r12-s11
juniperjunos
12.3:r12-s12
juniperjunos
12.3:r12-s13
juniperjunos
12.3:r12-s14
juniperjunos
12.3:r12-s15
juniperjunos
12.3:r12-s3
juniperjunos
12.3:r12-s4
juniperjunos
12.3:r12-s6
juniperjunos
12.3:r12-s8
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
12.3x48:x48
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
15.1
juniperjunos
15.1:a1
juniperjunos
15.1:f
juniperjunos
15.1:f1
juniperjunos
15.1:f2
juniperjunos
15.1:f2-s1
juniperjunos
15.1:f2-s2
juniperjunos
15.1:f2-s3
juniperjunos
15.1:f2-s4
juniperjunos
15.1:f3
juniperjunos
15.1:f4
juniperjunos
15.1:f5
juniperjunos
15.1:f5-s7
juniperjunos
15.1:f6
juniperjunos
15.1:f6-s1
juniperjunos
15.1:f6-s12
juniperjunos
15.1:f6-s2
juniperjunos
15.1:f6-s3
juniperjunos
15.1:f6-s4
juniperjunos
15.1:f6-s7
juniperjunos
15.1:f7
juniperjunos
15.1:r1
juniperjunos
15.1:r2
juniperjunos
15.1:r3
juniperjunos
15.1:r4
juniperjunos
15.1:r4-s7
juniperjunos
15.1:r4-s8
juniperjunos
15.1:r4-s9
juniperjunos
15.1:r5
juniperjunos
15.1:r5-s1
juniperjunos
15.1:r5-s5
juniperjunos
15.1:r5-s6
juniperjunos
15.1:r6
juniperjunos
15.1:r6-s1
juniperjunos
15.1:r6-s2
juniperjunos
15.1:r6-s6
juniperjunos
15.1:r7
juniperjunos
15.1:r7-s1
juniperjunos
15.1:r7-s2
juniperjunos
15.1:r7-s3
juniperjunos
15.1:r7-s4
juniperjunos
15.1:r7-s5
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
16.1
juniperjunos
16.1:r1
juniperjunos
16.1:r2
juniperjunos
16.1:r3
juniperjunos
16.1:r3-s10
juniperjunos
16.1:r3-s11
juniperjunos
16.1:r4
juniperjunos
16.1:r4-s12
juniperjunos
16.1:r4-s2
juniperjunos
16.1:r4-s3
juniperjunos
16.1:r4-s4
juniperjunos
16.1:r4-s6
juniperjunos
16.1:r5
juniperjunos
16.1:r5-s4
juniperjunos
16.1:r6-s1
juniperjunos
16.1:r6-s6
juniperjunos
16.1:r7
juniperjunos
16.1:r7-s2
juniperjunos
16.1:r7-s3
juniperjunos
16.1:r7-s4
juniperjunos
16.1:r7-s5
juniperjunos
16.1:r7-s6
juniperjunos
16.1:r7-s7
juniperjunos
17.2
juniperjunos
17.2:r1
juniperjunos
17.2:r1-s1
juniperjunos
17.2:r1-s2
juniperjunos
17.2:r1-s3
juniperjunos
17.2:r1-s4
juniperjunos
17.2:r1-s5
juniperjunos
17.2:r1-s7
juniperjunos
17.2:r1-s8
juniperjunos
17.2:r2
juniperjunos
17.2:r2-s11
juniperjunos
17.2:r2-s6
juniperjunos
17.2:r2-s7
juniperjunos
17.2:r3-s1
juniperjunos
17.2:r3-s2
juniperjunos
17.2:r3-s3
juniperjunos
17.3
juniperjunos
17.3:r1-s1
juniperjunos
17.3:r2
juniperjunos
17.3:r2-s1
juniperjunos
17.3:r2-s2
juniperjunos
17.3:r2-s3
juniperjunos
17.3:r2-s4
juniperjunos
17.3:r3
juniperjunos
17.3:r3-s1
juniperjunos
17.3:r3-s2
juniperjunos
17.3:r3-s3
juniperjunos
17.3:r3-s4
juniperjunos
17.3:r3-s7
juniperjunos
17.4
juniperjunos
17.4:r1
juniperjunos
17.4:r1-s1
juniperjunos
17.4:r1-s2
juniperjunos
17.4:r1-s4
juniperjunos
17.4:r1-s5
juniperjunos
17.4:r1-s6
juniperjunos
17.4:r1-s7
juniperjunos
17.4:r2
juniperjunos
17.4:r2-s1
juniperjunos
17.4:r2-s10
juniperjunos
17.4:r2-s2
juniperjunos
17.4:r2-s3
juniperjunos
17.4:r2-s4
juniperjunos
17.4:r2-s5
juniperjunos
17.4:r2-s6
juniperjunos
17.4:r2-s7
juniperjunos
17.4:r2-s8
juniperjunos
17.4:r2-s9
juniperjunos
17.4:r3
juniperjunos
17.4:r3-s1
juniperjunos
18.1
juniperjunos
18.1:r2
juniperjunos
18.1:r2-s1
juniperjunos
18.1:r2-s2
juniperjunos
18.1:r2-s4
juniperjunos
18.1:r3
juniperjunos
18.1:r3-s1
juniperjunos
18.1:r3-s2
juniperjunos
18.1:r3-s3
juniperjunos
18.1:r3-s4
juniperjunos
18.1:r3-s6
juniperjunos
18.1:r3-s7
juniperjunos
18.1:r3-s8
juniperjunos
18.1:r3-s9
juniperjunos
18.2
juniperjunos
18.2:r1-s3
juniperjunos
18.2:r1-s5
juniperjunos
18.2:r2-s1
juniperjunos
18.2:r2-s2
juniperjunos
18.2:r2-s3
juniperjunos
18.2:r2-s4
juniperjunos
18.2:r2-s5
juniperjunos
18.2:r2-s6
juniperjunos
18.2:r3
juniperjunos
18.2:r3-s1
juniperjunos
18.2:r3-s2
juniperjunos
18.2:r3-s3
juniperjunos
18.3
juniperjunos
18.3:r1
juniperjunos
18.3:r1-s1
juniperjunos
18.3:r1-s2
juniperjunos
18.3:r1-s3
juniperjunos
18.3:r1-s5
juniperjunos
18.3:r1-s6
juniperjunos
18.3:r2
juniperjunos
18.3:r2-s1
juniperjunos
18.3:r2-s2
juniperjunos
18.3:r2-s3
juniperjunos
18.3:r3
juniperjunos
18.3:r3-s1
juniperjunos
18.4
juniperjunos
18.4:r1
juniperjunos
18.4:r1-s1
juniperjunos
18.4:r1-s2
juniperjunos
18.4:r1-s3
juniperjunos
18.4:r1-s4
juniperjunos
18.4:r1-s5
juniperjunos
18.4:r1-s6
juniperjunos
18.4:r2
juniperjunos
18.4:r2-s1
juniperjunos
18.4:r2-s2
juniperjunos
18.4:r2-s3
juniperjunos
18.4:r3
juniperjunos
19.1
juniperjunos
19.1:r1
juniperjunos
19.1:r1-s1
juniperjunos
19.1:r1-s2
juniperjunos
19.1:r1-s3
juniperjunos
19.1:r1-s4
juniperjunos
19.2
juniperjunos
19.2:r1
juniperjunos
19.2:r1-s1
juniperjunos
19.2:r1-s2
juniperjunos
19.2:r1-s3
juniperjunos
19.3
juniperjunos
19.3:r1
juniperjunos
19.3:r1-s1
juniperjunos
19.3:r2
juniperjunos
19.3:r2-s1
juniperjunos
19.3:r2-s2
juniperjunos
19.4:r1
juniperjunos
19.4:r1-s1
juniperjunos
20.1:r1
𝑥
= Vulnerable software versions