Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: jsdm/ajax/port.php in J-Web arbitrary command execution (CVE-2013-6618)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Juniper Junos OS: jsdm/ajax/port.php in J-Web arbitrary command execution (CVE-2013-6618)

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
11/05/2013
Created
07/25/2018
Added
05/13/2014
Modified
02/13/2015

Description

jsdm/ajax/port.php in J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1 before 12.1R5, 12.2 before 12.2R3, and 12.3 before 12.3R1 allows remote authenticated users to execute arbitrary commands via the rsargs parameter in an exec action.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;