Junos Space Command Injection Vulnerability Allows Remote Command Execution
CVE-2024-39563
7.3HIGH
Summary
A Command Injection vulnerability exists in Juniper Networks' Junos Space, enabling unauthenticated, network-based attackers to send specially crafted requests that result in the execution of arbitrary shell commands on the Junos Space Appliance. The issue arises from inadequate input sanitization in a specific script within the web application, allowing malicious input passed via a GET request. Exploitation of this vulnerability can lead to remote command execution, potentially granting the attacker full control over the affected device. Only Junos Space version 24.1R1 is impacted, while earlier versions remain unaffected.
Affected Version(s)
Junos Space 24.1R1
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database