Description: An Improper Neutralization of CRLF Sequences in HTTP Headers (‘HTTP Response Splitting’) weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of the device and exfiltration information from the device without authentication. The weakness can be exploited to facilitate cross-site scripting (XSS), cookie manipulation (modifying session cookies, stealing cookies) and more. This weakness can also be exploited by directing a user to a seemingly legitimate link from the affected site. The attacker requires no special access or permissions to the device to carry out such attacks. This issue affects: Juniper Networks Junos OS: 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S3; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.1R1.
CVE-2021-0268
Published Date: 2021-04-22T20:15Z
Last Modified: 2022-08-05T17:14Z
CVSS Score: 9.3 (CRITICAL)
EPSS Score: 0.17%
Risk Score: 6.51 (HIGH)
Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.
CVSS:
9.3 |
EPSS:
0.17%
Mitre ATT&CK Technical v15.1
T1064 – Scripting
T1053.002 – At
Technical Analysis & Mitigation Measures
Reference Links
Vendor - Produce - Version
junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper
Disclaimer
The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.