ID

VAR-201703-0041


CVE

CVE-2016-4929


TITLE

Junos Space Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-008031

DESCRIPTION

Command injection vulnerability in Junos Space before 15.2R2 allows attackers to execute arbitrary code as a root user. Juniper Junos Space is prone to the following multiple security issues: 1. Cross-site scripting vulnerability 2. Cross-site request-forgery vulnerability 3. Authentication-bypass vulnerability 4. An XML external entity injection vulnerability 5. A command-injection vulnerability 6. A security-bypass vulnerability An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, execute arbitrary commands in the context of the application, perform certain administrative actions, gain unauthorized access, bypass certain security restrictions or cause denial-of-service conditions. Juniper Networks Junos Space is a set of network management solutions of Juniper Networks (Juniper Networks). The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle

Trust: 1.98

sources: NVD: CVE-2016-4929 // JVNDB: JVNDB-2016-008031 // BID: 93540 // VULHUB: VHN-93748

AFFECTED PRODUCTS

vendor:junipermodel:junos spacescope:lteversion:15.2

Trust: 1.0

vendor:junipermodel:junos spacescope:eqversion:15.2

Trust: 0.9

vendor:junipermodel:junos spacescope:ltversion:15.2r2

Trust: 0.8

vendor:junipermodel:junos space 15.2r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos space 15.2r2scope:neversion: -

Trust: 0.3

sources: BID: 93540 // JVNDB: JVNDB-2016-008031 // CNNVD: CNNVD-201610-464 // NVD: CVE-2016-4929

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4929
value: HIGH

Trust: 1.0

NVD: CVE-2016-4929
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201610-464
value: CRITICAL

Trust: 0.6

VULHUB: VHN-93748
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-4929
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-93748
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-4929
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-93748 // JVNDB: JVNDB-2016-008031 // CNNVD: CNNVD-201610-464 // NVD: CVE-2016-4929

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.9

sources: VULHUB: VHN-93748 // JVNDB: JVNDB-2016-008031 // NVD: CVE-2016-4929

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-464

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201610-464

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008031

PATCH

title:JSA10760url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10760

Trust: 0.8

title:Juniper Junos Space Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64835

Trust: 0.6

sources: JVNDB: JVNDB-2016-008031 // CNNVD: CNNVD-201610-464

EXTERNAL IDS

db:NVDid:CVE-2016-4929

Trust: 2.8

db:BIDid:93540

Trust: 2.0

db:JUNIPERid:JSA10760

Trust: 2.0

db:JVNDBid:JVNDB-2016-008031

Trust: 0.8

db:CNNVDid:CNNVD-201610-464

Trust: 0.7

db:VULHUBid:VHN-93748

Trust: 0.1

sources: VULHUB: VHN-93748 // BID: 93540 // JVNDB: JVNDB-2016-008031 // CNNVD: CNNVD-201610-464 // NVD: CVE-2016-4929

REFERENCES

url:http://www.securityfocus.com/bid/93540

Trust: 1.7

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10760

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4929

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-4929

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:http://www.juniper.net/au/en/products-services/software/junos-platform/junos-space/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10760&cat=sirt_1&actp=list

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10760

Trust: 0.1

sources: VULHUB: VHN-93748 // BID: 93540 // JVNDB: JVNDB-2016-008031 // CNNVD: CNNVD-201610-464 // NVD: CVE-2016-4929

CREDITS

The vendor reported the issue.

Trust: 0.3

sources: BID: 93540

SOURCES

db:VULHUBid:VHN-93748
db:BIDid:93540
db:JVNDBid:JVNDB-2016-008031
db:CNNVDid:CNNVD-201610-464
db:NVDid:CVE-2016-4929

LAST UPDATE DATE

2024-11-23T22:07:37.869000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-93748date:2017-03-22T00:00:00
db:BIDid:93540date:2016-10-26T02:07:00
db:JVNDBid:JVNDB-2016-008031date:2017-04-17T00:00:00
db:CNNVDid:CNNVD-201610-464date:2017-03-21T00:00:00
db:NVDid:CVE-2016-4929date:2024-11-21T02:53:15.380

SOURCES RELEASE DATE

db:VULHUBid:VHN-93748date:2017-03-20T00:00:00
db:BIDid:93540date:2016-10-12T00:00:00
db:JVNDBid:JVNDB-2016-008031date:2017-04-17T00:00:00
db:CNNVDid:CNNVD-201610-464date:2016-10-18T00:00:00
db:NVDid:CVE-2016-4929date:2017-03-20T20:59:00.250