// For flags

CVE-2018-0023

Junos Snapshot Administrator (JSNAPy) world writeable default configuration file permission

Severity Score

5.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.

JSNAPy es una versión de código abierto para Python de Junos Snapshot Administrator desarrollada por Juniper y disponible en github. La configuración por defecto y los archivos de muestra de la herramienta de automatización JSNAPy, en versiones anteriores a la 1.3.0, se crean de forma que sean modificables por cualquier usuario. Este permiso de archivo y directorio inseguro permite que usuarios locales sin privilegios alteren los archivos en este directorio, incluyendo la inserción de operaciones no planeadas por el mantenedor de paquetes, el administrador del sistema o por otros usuarios. Este problema solo afecta a los usuarios que hayan descargado e instalado JSNAPy a través de github.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-16 CVE Reserved
  • 2018-04-11 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-276: Incorrect Default Permissions
CAPEC
References (2)
URL Tag Source
http://www.securityfocus.com/bid/103745 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA10856 2019-10-09
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Jsnapy
Search vendor "Juniper" for product "Jsnapy"
< 1.3.0
Search vendor "Juniper" for product "Jsnapy" and version " < 1.3.0"
-
Affected