cve/2021/CVE-2021-31384.md
2024-05-25 21:48:12 +02:00

22 lines
1.8 KiB
Markdown

### [CVE-2021-31384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31384)
![](https://img.shields.io/static/v1?label=Product&message=Junos%20OS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=20.4%3E%3D%2020.4R1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-285%3A%20Improper%20Authorization&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-551%3A%20Incorrect%20Behavior%20Order%3A%20Authorization%20Before%20Parsing%20and%20Canonicalization&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%3A%20Missing%20Authorization&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme&color=brighgreen)
### Description
Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrative interfaces can successfully do so from any device interface regardless of the web-management configuration and filter rules which may otherwise protect access to J-Web. This issue affects: Juniper Networks Junos OS SRX Series 20.4 version 20.4R1 and later versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
### POC
#### Reference
- https://kb.juniper.net/
#### Github
No PoCs found on GitHub currently.