JSNAPy における認可・権限・アクセス制御に関する脆弱性
| Title |
JSNAPy における認可・権限・アクセス制御に関する脆弱性
|
| Summary |
JSNAPy には、認可・権限・アクセス制御に関する脆弱性が存在します。
|
| Possible impacts |
情報を改ざんされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
April 11, 2018, midnight |
| Registration Date |
June 14, 2018, 2:46 p.m. |
| Last Update |
June 14, 2018, 2:46 p.m. |
|
CVSS3.0 : 警告
|
| Score |
5.5
|
| Vector |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
CVSS2.0 : 注意
|
| Score |
2.1
|
| Vector |
AV:L/AC:L/Au:N/C:N/I:P/A:N |
Affected System
| ジュニパーネットワークス |
|
JSNAPy 1.3.0 未満
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年06月14日] 掲載 |
June 14, 2018, 2:46 p.m. |
NVD Vulnerability Information
CVE-2018-0023
| Summary |
JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.
|
| Publication Date |
April 12, 2018, 4:29 a.m. |
| Registration Date |
March 1, 2021, 6:35 p.m. |
| Last Update |
Nov. 21, 2024, 12:37 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:juniper:jsnapy:*:*:*:*:*:*:*:* |
|
|
|
1.3.0 |
Related information, measures and tools
Common Vulnerabilities List