Show plain JSON{"containers": {"cna": {"affected": [{"product": "Junos Space", "vendor": "Juniper Networks", "versions": [{"lessThan": "19.4R1", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "datePublic": "2020-01-08T00:00:00", "descriptions": [{"lang": "en", "value": "A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"description": "Local file inclusion", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2020-01-15T08:40:38", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://kb.juniper.net/JSA10993"}, {"tags": ["x_refsource_MISC"], "url": "https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1449224"}], "solutions": [{"lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos Space 19.4R1, and all subsequent releases."}], "source": {"advisory": "JSA10993", "defect": ["1449224"], "discovery": "INTERNAL"}, "title": "Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device.", "workarounds": [{"lang": "en", "value": "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation of these issues, use access lists or firewall filters to limit access to Junos Space to only trusted administrative networks, hosts and users."}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2020-01-08T17:00:00.000Z", "ID": "CVE-2020-1611", "STATE": "PUBLIC", "TITLE": "Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device."}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Junos Space", "version": {"version_data": [{"version_affected": "<", "version_value": "19.4R1"}]}}]}, "vendor_name": "Juniper Networks"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Local file inclusion"}]}]}, "references": {"reference_data": [{"name": "https://kb.juniper.net/JSA10993", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10993"}, {"name": "https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1449224", "refsource": "MISC", "url": "https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1449224"}]}, "solution": [{"lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos Space 19.4R1, and all subsequent releases."}], "source": {"advisory": "JSA10993", "defect": ["1449224"], "discovery": "INTERNAL"}, "work_around": [{"lang": "en", "value": "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation of these issues, use access lists or firewall filters to limit access to Junos Space to only trusted administrative networks, hosts and users."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T06:39:10.790Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://kb.juniper.net/JSA10993"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1449224"}]}]}, "cveMetadata": {"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2020-1611", "datePublished": "2020-01-15T08:40:38.352672Z", "dateReserved": "2019-11-04T00:00:00", "dateUpdated": "2024-09-16T16:32:34.144Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}