Many superior-severity security flaws have been disclosed as affecting Juniper Networks products, some of which could be exploited to obtain code execution.
Chief among the them is a remote pre-authenticated PHP archive file deserialization vulnerability (CVE-2022-22241, CVSS rating: 8.1) in the J-Web component of Junos OS, according to Octagon Networks researcher Paulos Yibelo.
“This vulnerability can be exploited by an unauthenticated distant attacker to get distant phar information deserialized, top to arbitrary file write, which potential customers to a remote code execution (RCE),” Yibelo claimed in a report shared with The Hacker Information.
Also recognized are five other issues, which are stated as stick to –
- CVE-2022-22242 (CVSS rating: 6.1) – A pre-authenticated mirrored XSS on the error site (“mistake.php”), making it possible for a remote adversary to siphon Junos OS admin session and chained with other flaws that involve authentication.
- CVE-2022-22243 (CVSS score: 4.3) & CVE-2022-22244 (CVSS score: 5.3) – Two XPATH injection flaws that exploited by a distant authenticated attacker to steal and manipulate Junos OS admin classes
- CVE-2022-22245 (CVSS rating: 4.3) – A route traversal flaw that could permit a remote authenticated attacker to upload PHP information to any arbitrary area, in a way related to that of the not too long ago disclosed RARlab UnRAR flaw (CVE-2022-30333), and
- CVE-2022-22246 (CVSS score: 7.5) – A area file inclusion vulnerability that could be weaponized to operate untrusted PHP code.
“This [CVE-2022-22246] makes it possible for an attacker the means to involve any PHP file saved on the server,” Yibelo famous. “If this vulnerability is exploited together with the file upload vulnerability, it can lead to remote code execution.”
Consumers of Juniper Networks firewalls, routers, and switches are recommended to use the newest software package patch readily available for Junos OS to mitigate aforementioned threats.
“A person or additional of these issues could lead to unauthorized area file access, cross-site scripting attacks, route injection and traversal, or community file inclusion,” Juniper Networks disclosed in an advisory produced on Oct 12, 2022.
The issues have been addressed in Junos OS versions 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and afterwards.
Discovered this article exciting? Adhere to THN on Fb, Twitter and LinkedIn to read through a lot more distinctive content we put up.
Some parts of this article are sourced from:
thehackernews.com