Vulnerability Name:

CVE-2013-6618 (CCN-87011)

Assigned:2013-09-11
Published:2013-09-11
Updated:2017-08-29
Summary:jsdm/ajax/port.php in J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1 before 12.1R5, 12.2 before 12.2R3, and 12.3 before 12.3R1 allows remote authenticated users to execute arbitrary commands via the rsargs parameter in an exec action.
CVSS v3 Severity:8.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
8.5 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
6.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2013-6618

Source: CCN
Type: JSA10560
Junos: J-Web Sajax remote code execution

Source: CONFIRM
Type: Vendor Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10560

Source: CCN
Type: SA54731
Juniper Junos J-Web Arbitrary Command Execution Vulnerability

Source: SECUNIA
Type: Vendor Advisory
54731

Source: EXPLOIT-DB
Type: UNKNOWN
29544

Source: BID
Type: Exploit
62305

Source: CCN
Type: BID-62305
Juniper Junos J-Web Privilege Escalation Vulnerability

Source: SECTRACK
Type: UNKNOWN
1029016

Source: MISC
Type: Exploit
http://www.senseofsecurity.com.au/advisories/SOS-13-003

Source: XF
Type: UNKNOWN
juniper-port-command-execution(87011)

Source: XF
Type: UNKNOWN
juniper-port-command-execution(87011)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [11-12-2013]

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:10.3:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version <= 10.4)
  • OR cpe:/o:juniper:junos:11.4:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:12.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:12.2:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:12.3:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos:10.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos 10.0
    juniper junos 10.1
    juniper junos 10.2
    juniper junos 10.3
    juniper junos *
    juniper junos 11.4
    juniper junos 12.1
    juniper junos 12.2
    juniper junos 12.3
    juniper junos 10.4