CVE-2024-21620
25.01.2024, 23:15
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator.
A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives.
This issue affects Juniper Networks Junos OS on SRX Series and EX Series:
* All versions earlier than 20.4R3-S10;
* 21.2 versions earlier than 21.2R3-S8;
* 21.4 versions earlier than 21.4R3-S6;
* 22.1 versions earlier than 22.1R3-S5;
* 22.2 versions earlier than 22.2R3-S3;
* 22.3 versions earlier than 22.3R3-S2;
* 22.4 versions earlier than 22.4R3-S1;
* 23.2 versions earlier than 23.2R2;
* 23.4 versions earlier than 23.4R2.
| Vendor | Product | Version |
|---|---|---|
| juniper | junos | 𝑥 < 20.4 |
| juniper | junos | 20.4 |
| juniper | junos | 20.4:r1 |
| juniper | junos | 20.4:r1-s1 |
| juniper | junos | 20.4:r2 |
| juniper | junos | 20.4:r2-s1 |
| juniper | junos | 20.4:r2-s2 |
| juniper | junos | 20.4:r3 |
| juniper | junos | 20.4:r3-s1 |
| juniper | junos | 20.4:r3-s2 |
| juniper | junos | 20.4:r3-s3 |
| juniper | junos | 20.4:r3-s4 |
| juniper | junos | 20.4:r3-s5 |
| juniper | junos | 20.4:r3-s6 |
| juniper | junos | 20.4:r3-s7 |
| juniper | junos | 20.4:r3-s8 |
| juniper | junos | 20.4:r3-s9 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2:r1 |
| juniper | junos | 21.2:r1-s1 |
| juniper | junos | 21.2:r1-s2 |
| juniper | junos | 21.2:r2 |
| juniper | junos | 21.2:r2-s1 |
| juniper | junos | 21.2:r2-s2 |
| juniper | junos | 21.2:r3 |
| juniper | junos | 21.2:r3-s1 |
| juniper | junos | 21.2:r3-s2 |
| juniper | junos | 21.2:r3-s3 |
| juniper | junos | 21.2:r3-s4 |
| juniper | junos | 21.2:r3-s5 |
| juniper | junos | 21.2:r3-s6 |
| juniper | junos | 21.2:r3-s7 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4:r1 |
| juniper | junos | 21.4:r1-s1 |
| juniper | junos | 21.4:r1-s2 |
| juniper | junos | 21.4:r2 |
| juniper | junos | 21.4:r2-s1 |
| juniper | junos | 21.4:r2-s2 |
| juniper | junos | 21.4:r3 |
| juniper | junos | 21.4:r3-s1 |
| juniper | junos | 21.4:r3-s2 |
| juniper | junos | 21.4:r3-s3 |
| juniper | junos | 21.4:r3-s4 |
| juniper | junos | 21.4:r3-s5 |
| juniper | junos | 22.1 |
| juniper | junos | 22.1:r1 |
| juniper | junos | 22.1:r1-s1 |
| juniper | junos | 22.1:r1-s2 |
| juniper | junos | 22.1:r2 |
| juniper | junos | 22.1:r2-s1 |
| juniper | junos | 22.1:r2-s2 |
| juniper | junos | 22.1:r3 |
| juniper | junos | 22.1:r3-s1 |
| juniper | junos | 22.1:r3-s2 |
| juniper | junos | 22.1:r3-s3 |
| juniper | junos | 22.1:r3-s4 |
| juniper | junos | 22.2 |
| juniper | junos | 22.2:r1 |
| juniper | junos | 22.2:r1-s1 |
| juniper | junos | 22.2:r1-s2 |
| juniper | junos | 22.2:r2 |
| juniper | junos | 22.2:r2-s1 |
| juniper | junos | 22.2:r2-s2 |
| juniper | junos | 22.2:r3 |
| juniper | junos | 22.2:r3-s1 |
| juniper | junos | 22.2:r3-s2 |
| juniper | junos | 22.3 |
| juniper | junos | 22.3:r1 |
| juniper | junos | 22.3:r1-s1 |
| juniper | junos | 22.3:r1-s2 |
| juniper | junos | 22.3:r2 |
| juniper | junos | 22.3:r2-s1 |
| juniper | junos | 22.3:r2-s2 |
| juniper | junos | 22.3:r3 |
| juniper | junos | 22.3:r3-s1 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4:r1 |
| juniper | junos | 22.4:r1-s1 |
| juniper | junos | 22.4:r1-s2 |
| juniper | junos | 22.4:r2 |
| juniper | junos | 22.4:r2-s1 |
| juniper | junos | 22.4:r2-s2 |
| juniper | junos | 22.4:r3 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2:r1 |
| juniper | junos | 23.2:r1-s1 |
| juniper | junos | 23.2:r1-s2 |
| juniper | junos | 23.4:r1 |
𝑥
= Vulnerable software versions