// For flags

CVE-2008-1181

Juniper Networks Secure Access 2000 Web - Root Full Path Disclosure

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Juniper Networks Secure Access 2000 5.5 R1 (build 11711) allows remote attackers to obtain sensitive information via a direct request for remediate.cgi without certain parameters, which reveals the path in an "Execute failed" error message.

Juniper Networks Secure Access 2000 5.5 R1 (build 11711) permite a atacantes remotos obtener información sensible a través de una petición directa para remediate.cgi sin ciertos parámetros, lo cual muestra la ruta en un mensaje de error "Execute failed".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-02-28 First Exploit
  • 2008-03-05 CVE Reserved
  • 2008-03-06 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-08 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Secure Access 2000
Search vendor "Juniper" for product "Secure Access 2000"
5.5
Search vendor "Juniper" for product "Secure Access 2000" and version "5.5"
r1, build_11711
Affected