A Path Traversal vulnerability in the J-Web component of Juniper Networks Junos OS allows an authenticated attacker to upload arbitrary files to the device by bypassing validation checks built into Junos OS. The attacker should not be able to execute the file due to validation checks built into Junos OS. Successful exploitation of this vulnerability could lead to loss of filesystem integrity. This issue affects Juniper Networks Junos OS: all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA69899 | Vendor Advisory |
https://kb.juniper.net/JSA69899 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.juniper.net/JSA69899 - Vendor Advisory |
Information
Published : 2022-10-18 03:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22245
Mitre link : CVE-2022-22245
CVE.ORG link : CVE-2022-22245
JSON object : View
Products Affected
juniper
- junos