Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: CSRF Protection bypass vulnerability in J-Web (JSA10597) (CVE-2013-4689)

Back to Search

Juniper Junos OS: CSRF Protection bypass vulnerability in J-Web (JSA10597) (CVE-2013-4689)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
10/17/2013
Created
07/25/2018
Added
05/07/2014
Modified
05/27/2016

Description

J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1R before 12.1R6, 12.1X44 before 12.1X44-D15, 12.1x45 before 12.1X45-D10, 12.2 before 12.2R3, 12.3 before 12.3R2, and 13.1 before 13.1R3 allow remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism and hijack the authentication of administrators for requests that (1) create new administrator accounts or (2) have other unspecified impacts.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;