cve/2020/CVE-2020-1611.md

24 lines
973 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-1611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1611)
![](https://img.shields.io/static/v1?label=Product&message=Junos%20Space&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2019.4R1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Local%20file%20inclusion&color=brighgreen)
### Description
A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ibonok/CVE-2020-1611
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/r0eXpeR/supplier
- https://github.com/soosmile/POC