CVE-2013-6618
Juniper Junos J-Web - Privilege Escalation
Severity Score
9.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
jsdm/ajax/port.php in J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1 before 12.1R5, 12.2 before 12.2R3, and 12.3 before 12.3R1 allows remote authenticated users to execute arbitrary commands via the rsargs parameter in an exec action.
jsdm / ajax / port.php de J-Web en Juniper Junos anterior 10.4R13, 11.4 anterior a 11.4R, 12,.1 anterior a 12.1R5 anterior a 12.2R3 y 12.3 antes 12.3R1 permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través del parámetro rsargs en una acción exec.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2013-11-05 CVE Reserved
- 2013-11-05 CVE Published
- 2013-11-12 First Exploit
- 2024-05-23 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securitytracker.com/id/1029016 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/87011 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/29544 | 2013-11-12 | |
http://www.exploit-db.com/exploits/29544 | 2024-08-06 | |
http://www.securityfocus.com/bid/62305 | 2024-08-06 | |
http://www.senseofsecurity.com.au/advisories/SOS-13-003 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10560 | 2024-02-14 | |
http://secunia.com/advisories/54731 | 2024-02-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | <= 10.4 Search vendor "Juniper" for product "Junos" and version " <= 10.4" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 10.0 Search vendor "Juniper" for product "Junos" and version "10.0" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 10.1 Search vendor "Juniper" for product "Junos" and version "10.1" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 10.2 Search vendor "Juniper" for product "Junos" and version "10.2" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 10.3 Search vendor "Juniper" for product "Junos" and version "10.3" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 11.4 Search vendor "Juniper" for product "Junos" and version "11.4" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 12.1 Search vendor "Juniper" for product "Junos" and version "12.1" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 12.2 Search vendor "Juniper" for product "Junos" and version "12.2" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 12.3 Search vendor "Juniper" for product "Junos" and version "12.3" | - |
Affected
|