First published: Tue Jan 15 2019(Updated: )
A malicious authenticated user may be able to delete a device from the Junos Space database without the necessary privileges through crafted Ajax interactions obtained from another legitimate delete action performed by another administrative user. Affected releases are Juniper Networks Junos Space versions prior to 18.3R1.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos Space | =13.3-r1 | |
Juniper Junos Space | =13.3-r2 | |
Juniper Junos Space | =13.3-r3 | |
Juniper Junos Space | =13.3-r4 | |
Juniper Junos Space | =14.1 | |
Juniper Junos Space | =14.1-r1 | |
Juniper Junos Space | =14.1-r2 | |
Juniper Junos Space | =14.1-r3 | |
Juniper Junos Space | =15.1-r1 | |
Juniper Junos Space | =15.1-r2 | |
Juniper Junos Space | =15.1-r3 | |
Juniper Junos Space | =15.1-r4 | |
Juniper Junos Space | =15.2 | |
Juniper Junos Space | =15.2-r1 | |
Juniper Junos Space | =15.2-r2 | |
Juniper Junos Space | =16.1 | |
Juniper Junos Space | =16.1-r1 | |
Juniper Junos Space | =16.1-r2 | |
Juniper Junos Space | =16.1-r3 | |
Juniper Junos Space | =17.1-r1 | |
Juniper Junos Space | =17.2-r1.4 | |
Juniper Junos Space | =18.1-r1 | |
Juniper Junos Space | =18.2-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.