First published: Thu Jan 25 2024(Updated: )
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator. A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S10; * 21.2 versions earlier than 21.2R3-S8; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3-S1; * 23.2 versions earlier than 23.2R2; * 23.4 versions earlier than 23.4R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Juniper Junos | <20.4 | |
Juniper Junos | =20.4 | |
Juniper Junos | =20.4-r1 | |
Juniper Junos | =20.4-r1-s1 | |
Juniper Junos | =20.4-r2 | |
Juniper Junos | =20.4-r2-s1 | |
Juniper Junos | =20.4-r2-s2 | |
Juniper Junos | =20.4-r3 | |
Juniper Junos | =20.4-r3-s1 | |
Juniper Junos | =20.4-r3-s2 | |
Juniper Junos | =20.4-r3-s3 | |
Juniper Junos | =20.4-r3-s4 | |
Juniper Junos | =20.4-r3-s5 | |
Juniper Junos | =20.4-r3-s6 | |
Juniper Junos | =20.4-r3-s7 | |
Juniper Junos | =20.4-r3-s8 | |
Juniper Junos | =20.4-r3-s9 | |
Juniper Junos | =21.2 | |
Juniper Junos | =21.2-r1 | |
Juniper Junos | =21.2-r1-s1 | |
Juniper Junos | =21.2-r1-s2 | |
Juniper Junos | =21.2-r2 | |
Juniper Junos | =21.2-r2-s1 | |
Juniper Junos | =21.2-r2-s2 | |
Juniper Junos | =21.2-r3 | |
Juniper Junos | =21.2-r3-s1 | |
Juniper Junos | =21.2-r3-s2 | |
Juniper Junos | =21.2-r3-s3 | |
Juniper Junos | =21.2-r3-s4 | |
Juniper Junos | =21.2-r3-s5 | |
Juniper Junos | =21.2-r3-s6 | |
Juniper Junos | =21.2-r3-s7 | |
Juniper Junos | =21.4 | |
Juniper Junos | =21.4-r1 | |
Juniper Junos | =21.4-r1-s1 | |
Juniper Junos | =21.4-r1-s2 | |
Juniper Junos | =21.4-r2 | |
Juniper Junos | =21.4-r2-s1 | |
Juniper Junos | =21.4-r2-s2 | |
Juniper Junos | =21.4-r3 | |
Juniper Junos | =21.4-r3-s1 | |
Juniper Junos | =21.4-r3-s2 | |
Juniper Junos | =21.4-r3-s3 | |
Juniper Junos | =21.4-r3-s4 | |
Juniper Junos | =21.4-r3-s5 | |
Juniper Junos | =22.1 | |
Juniper Junos | =22.1-r1 | |
Juniper Junos | =22.1-r1-s1 | |
Juniper Junos | =22.1-r1-s2 | |
Juniper Junos | =22.1-r2 | |
Juniper Junos | =22.1-r2-s1 | |
Juniper Junos | =22.1-r2-s2 | |
Juniper Junos | =22.1-r3 | |
Juniper Junos | =22.1-r3-s1 | |
Juniper Junos | =22.1-r3-s2 | |
Juniper Junos | =22.1-r3-s3 | |
Juniper Junos | =22.1-r3-s4 | |
Juniper Junos | =22.2 | |
Juniper Junos | =22.2-r1 | |
Juniper Junos | =22.2-r1-s1 | |
Juniper Junos | =22.2-r1-s2 | |
Juniper Junos | =22.2-r2 | |
Juniper Junos | =22.2-r2-s1 | |
Juniper Junos | =22.2-r2-s2 | |
Juniper Junos | =22.2-r3 | |
Juniper Junos | =22.2-r3-s1 | |
Juniper Junos | =22.2-r3-s2 | |
Juniper Junos | =22.3 | |
Juniper Junos | =22.3-r1 | |
Juniper Junos | =22.3-r1-s1 | |
Juniper Junos | =22.3-r1-s2 | |
Juniper Junos | =22.3-r2 | |
Juniper Junos | =22.3-r2-s1 | |
Juniper Junos | =22.3-r2-s2 | |
Juniper Junos | =22.3-r3 | |
Juniper Junos | =22.3-r3-s1 | |
Juniper Junos | =22.4 | |
Juniper Junos | =22.4-r1 | |
Juniper Junos | =22.4-r1-s1 | |
Juniper Junos | =22.4-r1-s2 | |
Juniper Junos | =22.4-r2 | |
Juniper Junos | =22.4-r2-s1 | |
Juniper Junos | =22.4-r2-s2 | |
Juniper Junos | =22.4-r3 | |
Juniper Junos | =23.2 | |
Juniper Junos | =23.2-r1 | |
Juniper Junos | =23.2-r1-s1 | |
Juniper Junos | =23.2-r1-s2 | |
Juniper Junos | =23.4-r1 | |
Any of | ||
Juniper EX Redundant Power System | ||
Juniper EX Series | ||
Juniper EX2200 | ||
Juniper EX2200 | ||
Juniper EX2200 | ||
Juniper EX2300-24T | ||
Juniper EX2300 Multigigabit | ||
Juniper EX2300-24P | ||
Juniper EX2300-24T | ||
Juniper EX2300-48MP | ||
Juniper EX2300-48P | ||
Juniper EX2300-48T | ||
Juniper EX2300-C | ||
Juniper EX2300 Multigigabit | ||
Juniper EX2300 | ||
Juniper EX3200 | ||
Juniper EX3300 | ||
Juniper EX3300 | ||
Juniper EX3400 | ||
Juniper EX4100 Multigigabit | ||
Juniper EX4100 | ||
Juniper EX4100 Multigigabit | ||
Juniper EX4200 | ||
Juniper EX4200 | ||
Juniper EX4300-24T | ||
Juniper EX4300-24P | ||
Juniper EX4300 | ||
Juniper EX4300-24T-S | ||
Juniper EX4300-24T-S | ||
Juniper EX4300-32F | ||
Juniper EX4300 | ||
Juniper EX4300-32F-S | ||
Juniper EX4300-48MP | ||
Juniper EX4300-48MP-S | ||
Juniper EX4300-48P | ||
Juniper EX4300-48P | ||
Juniper EX4300-48T | ||
Juniper EX4300-48T-AFI | ||
Juniper EX4300-48T-DC | ||
Juniper EX4300-48T-DC-AFI | ||
Juniper EX4300-48T-S | ||
Juniper EX4300-48TAFI | ||
Juniper EX4300-48TDC | ||
Juniper EX4300-48TDC-AFI | ||
Juniper EX4300 | ||
Juniper EX4300 | ||
Juniper EX4300 Multigigabit | ||
Juniper EX4300 | ||
Juniper EX4400 | ||
Juniper EX4400 | ||
Juniper EX4400 Multigigabit | ||
Juniper EX4500 | ||
juniper ex4500-vc | ||
Juniper EX4550 | ||
Juniper EX4550 | ||
Juniper EX4550 | ||
Juniper EX4600 | ||
Juniper EX4600 | ||
Juniper EX4650 | ||
Juniper EX6200 | ||
Juniper EX6210 | ||
Juniper EX8200 | ||
Juniper EX8200 | ||
Juniper EX8208 | ||
Juniper EX8216 | ||
Juniper EX9200 | ||
Juniper EX9204 | ||
Juniper EX9208 | ||
Juniper EX9214 | ||
Juniper EX9250 | ||
Juniper EX9251 | ||
Juniper EX9253 | ||
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX1500 | ||
Juniper SRX1600 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX2300 | ||
Juniper SRX240 | ||
Juniper SRX240H2 | ||
Juniper SRX240M | ||
Juniper SRX300 | ||
Juniper SRX320 | ||
Juniper SRX340 | ||
Juniper SRX3400 | ||
Juniper SRX345 | ||
Juniper SRX3600 | ||
Juniper SRX380 | ||
Juniper SRX4000 | ||
Juniper SRX4100 | ||
Juniper SRX4200 | ||
Juniper SRX4300 | ||
Juniper SRX4600 | ||
Juniper SRX4700 | ||
Junos OS SRX 5000 Series | ||
Juniper SRX5400 | ||
Juniper SRX550 | ||
Juniper SRX550 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 | ||
Juniper Networks Junos OS | ||
Juniper SRX Series | ||
Juniper Networks EX Series switch |
The following software releases have been updated to resolve this specific issue: 20.4R3-S10*, 21.2R3-S8*, 21.4R3-S6*, 22.1R3-S5*, 22.2R3-S3*, 22.3R3-S2*, 22.4R3-S1*, 23.2R2*, 23.4R2*, 24.2R1*, and all subsequent releases. * Pending Publication
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-21620 has a high severity rating due to its potential to allow cross-site scripting attacks.
To remediate CVE-2024-21620, you should update the Junos OS on affected devices to the latest patched version provided by Juniper Networks.
CVE-2024-21620 affects several versions of Junos OS prior to the fixed releases, including versions up to 22.4.
CVE-2024-21620 impacts Juniper Networks' SRX Series and EX Series devices running affected versions of Junos OS.
Currently, no known workarounds for CVE-2024-21620 are recommended apart from applying the security updates.