ID

VAR-201710-0039


CVE

CVE-2016-1261


TITLE

Juniper Networks Junos OS of J-Web Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2016-008843

DESCRIPTION

J-Web does not validate certain input that may lead to cross-site request forgery (CSRF) issues or cause a denial of J-Web service (DoS). Juniper Junos is prone to cross-site request-forgery and denial-of-service vulnerabilities. Exploiting these issues may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application or cause denial-of-service conditions. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. The vulnerability stems from the program's improper handling of J-Web input

Trust: 1.98

sources: NVD: CVE-2016-1261 // JVNDB: JVNDB-2016-008843 // BID: 86039 // VULHUB: VHN-90080

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:12.3

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:14.2

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x47

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.3x48

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.3

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.2x51

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:14.1x53

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x44

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:12.1x46

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:14.1

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1x49

Trust: 1.0

vendor:junipermodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2016-008843 // CNNVD: CNNVD-201604-295 // NVD: CVE-2016-1261

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1261
value: HIGH

Trust: 1.0

sirt@juniper.net: CVE-2016-1261
value: HIGH

Trust: 1.0

NVD: CVE-2016-1261
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201604-295
value: HIGH

Trust: 0.6

VULHUB: VHN-90080
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1261
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-90080
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1261
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sirt@juniper.net: CVE-2016-1261
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-90080 // JVNDB: JVNDB-2016-008843 // CNNVD: CNNVD-201604-295 // NVD: CVE-2016-1261 // NVD: CVE-2016-1261

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-90080 // JVNDB: JVNDB-2016-008843 // NVD: CVE-2016-1261

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201604-295

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201604-295

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008843

PATCH

title:JSA10723url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10723&actp=METADATA

Trust: 0.8

title:Juniper Junos OS Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99589

Trust: 0.6

sources: JVNDB: JVNDB-2016-008843 // CNNVD: CNNVD-201604-295

EXTERNAL IDS

db:NVDid:CVE-2016-1261

Trust: 2.8

db:JUNIPERid:JSA10723

Trust: 1.7

db:JVNDBid:JVNDB-2016-008843

Trust: 0.8

db:CNNVDid:CNNVD-201604-295

Trust: 0.7

db:BIDid:86039

Trust: 0.4

db:VULHUBid:VHN-90080

Trust: 0.1

sources: VULHUB: VHN-90080 // BID: 86039 // JVNDB: JVNDB-2016-008843 // CNNVD: CNNVD-201604-295 // NVD: CVE-2016-1261

REFERENCES

url:https://kb.juniper.net/jsa10723

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1261

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-1261

Trust: 0.8

sources: VULHUB: VHN-90080 // JVNDB: JVNDB-2016-008843 // CNNVD: CNNVD-201604-295 // NVD: CVE-2016-1261

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 86039

SOURCES

db:VULHUBid:VHN-90080
db:BIDid:86039
db:JVNDBid:JVNDB-2016-008843
db:CNNVDid:CNNVD-201604-295
db:NVDid:CVE-2016-1261

LAST UPDATE DATE

2024-08-14T14:39:37.562000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-90080date:2019-10-09T00:00:00
db:BIDid:86039date:2016-04-13T00:00:00
db:JVNDBid:JVNDB-2016-008843date:2017-11-10T00:00:00
db:CNNVDid:CNNVD-201604-295date:2019-10-17T00:00:00
db:NVDid:CVE-2016-1261date:2019-10-09T23:17:15.170

SOURCES RELEASE DATE

db:VULHUBid:VHN-90080date:2017-10-13T00:00:00
db:BIDid:86039date:2016-04-13T00:00:00
db:JVNDBid:JVNDB-2016-008843date:2017-11-10T00:00:00
db:CNNVDid:CNNVD-201604-295date:2016-04-14T00:00:00
db:NVDid:CVE-2016-1261date:2017-10-13T17:29:00.190