First published: Tue Nov 05 2013(Updated: )
jsdm/ajax/port.php in J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1 before 12.1R5, 12.2 before 12.2R3, and 12.3 before 12.3R1 allows remote authenticated users to execute arbitrary commands via the rsargs parameter in an exec action.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | <=10.4 | |
Juniper JUNOS | =10.0 | |
Juniper JUNOS | =10.1 | |
Juniper JUNOS | =10.2 | |
Juniper JUNOS | =10.3 | |
Juniper JUNOS | =11.4 | |
Juniper JUNOS | =12.1 | |
Juniper JUNOS | =12.2 | |
Juniper JUNOS | =12.3 | |
<=10.4 | ||
=10.0 | ||
=10.1 | ||
=10.2 | ||
=10.3 | ||
=11.4 | ||
=12.1 | ||
=12.2 | ||
=12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.