First published: Tue Oct 19 2021(Updated: )
A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to disclose sensitive information in the HTTP response which allows the attacker to obtain sensitive information.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Session and Resource Control | <4.12.0r5 | |
Juniper Session and Resource Control | >=4.13.0r1<4.13.0r3 |
The following software releases have been updated to resolve this specific issue: 4.12.0R5, 4.13.0R3, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31380 is classified as a high-severity vulnerability due to its potential to disclose sensitive information.
To address CVE-2021-31380, users should upgrade their Juniper Session and Resource Control to versions beyond 4.13.0r3 or 4.12.0r5.
CVE-2021-31380 affects Juniper Networks SRC Series running specific versions of the JBoss Application Server.
CVE-2021-31380 involves a remote attacker crafting a query to retrieve sensitive information from the affected server.
Yes, CVE-2021-31380 can be exploited remotely by an attacker who sends a specially crafted query to the affected server.