Application Details
Junos OS is a free Unix like open-source operating system, used in Juniper Networks routing, switching and security devices.
Vulnerability
Juniper Networks Junos OS could allow a remote attacker to execute arbitrary commands on the system, caused by improper input validation in the J-Web component.
Identification
By sending a specially crafted POST request, an attacker could exploit this vulnerability to execute arbitrary commands or gain unauthorised local file access.
POST /jsdm/ajax/logging_browse.php
PAYLOAD - filepath=phar:////pharfile.jpg
Detection
By turning this into a traffic file and matching rule, we are able to detect attempts to execute arbitrary commands, or gain unauthorised local file access.
Coverage
Idappcom have created signature 8023282 along with a traffic file for this vulnerability.
References
Traffic IQ
If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional
Comments