Juniper Junos J-Web Remote Code Execution (PSN-2013-04-914)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

According to its self-reported version number, the remote Junos device
has a remote code execution vulnerability. When J-Web is enabled,
authenticated users can execute arbitrary commands. This could allow an
unprivileged user (e.g., read only access) to get complete
administrative access. A remote, authenticated attacker could exploit
this to run arbitrary commands with administrative privileges.

See also :

http://www.nessus.org/u?3f3b3a90

Solution :

Apply the relevant Junos upgrade referenced in Juniper advisory
PSN-2013-04-914.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 6.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Junos Local Security Checks

Nessus Plugin ID: 66512 ()

Bugtraq ID: 60013

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now