Juniper Networks Juniper Secure Analytics update for third-party applications



Published: 2024-02-01 | Updated: 2024-04-19
Risk Medium
Patch available YES
Number of vulnerabilities 20
CVE-ID CVE-2023-45133
CVE-2023-38263
CVE-2023-38020
CVE-2023-38019
CVE-2021-31684
CVE-2021-23445
CVE-2021-4048
CVE-2023-1370
CVE-2023-31484
CVE-2022-25883
CVE-2023-35116
CVE-2023-37920
CVE-2023-43804
CVE-2023-46136
CVE-2023-33201
CVE-2023-2976
CVE-2023-43642
CVE-2023-34454
CVE-2023-34455
CVE-2023-34453
CWE-ID CWE-697
CWE-284
CWE-117
CWE-22
CWE-20
CWE-79
CWE-125
CWE-674
CWE-295
CWE-185
CWE-345
CWE-200
CWE-407
CWE-90
CWE-276
CWE-770
CWE-190
CWE-400
Exploitation vector Network
Public exploit Public exploit code for vulnerability #13 is available.
Vulnerable software
Subscribe
Juniper Secure Analytics (JSA)
Server applications / IDS/IPS systems, Firewalls and proxy servers

Vendor Juniper Networks, Inc.

Security Bulletin

This security bulletin contains information about 20 vulnerabilities.

1) Incorrect Comparison

EUVDB-ID: #VU83234

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-45133

CWE-ID: CWE-697 - Incorrect Comparison

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists in '@babel/traverse' and `babel-traverse`. A local user can execute arbitrary code during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper access control

EUVDB-ID: #VU85983

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-38263

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper Output Neutralization for Logs

EUVDB-ID: #VU85985

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-38020

CWE-ID: CWE-117 - Improper Output Neutralization for Logs

Exploit availability: No

Description

The vulnerability allows a remote user to manipulate data in log files.

The vulnerability exists due to improper input validation. A remote user can manipulate output written to log files.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Path traversal

EUVDB-ID: #VU85984

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-38019

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote user  can send a specially crafted HTTP request and read arbitrary files on the system.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper input validation

EUVDB-ID: #VU65499

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-31684

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within indexOf() function of JSONParserByteArray. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Cross-site scripting

EUVDB-ID: #VU60621

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-23445

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds read

EUVDB-ID: #VU69295

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-4048

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack. A remote attacker can pass specially crafted data to the application, trigger an out-of-bounds read error and crash the affected application.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Uncontrolled Recursion

EUVDB-ID: #VU75044

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1370

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion when processing nested arrays and objects. A remote attacker can pass specially crafted JSON data to the application and perform a denial of service (DoS) attack.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper Certificate Validation

EUVDB-ID: #VU75604

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-31484

CWE-ID: CWE-295 - Improper Certificate Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to missing verification of the TLS certificate when downloading distributions. A remote attacker can perform MitM attack and trick the application into downloading a malicious file.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Incorrect Regular Expression

EUVDB-ID: #VU78932

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25883

CWE-ID: CWE-185 - Incorrect Regular Expression

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation when processing regular expressions. A remote attacker can pass specially crafted data to the application via the new Range function and perform regular expression denial of service (ReDos) attack.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Improper input validation

EUVDB-ID: #VU82122

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-35116

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote authenticated user to perform service disruption.

The vulnerability exists due to improper input validation within the Oracle Database Fleet Patching and Provisioning (jackson-databind) in Oracle Database Server. A remote authenticated user can exploit this vulnerability to perform service disruption.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Insufficient verification of data authenticity

EUVDB-ID: #VU79296

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-37920

CWE-ID: CWE-345 - Insufficient Verification of Data Authenticity

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exist due to software recognizes "e-Tugra" root certificates, which were subject to an investigation prompted by reporting of security issues in their systems. An attacker with ability to generate certificates signed with the  compromised "e-Tugra" root certificate can perform MitM attack.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Information disclosure

EUVDB-ID: #VU81322

Risk: Low

CVSSv3.1: 3.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2023-43804

CWE-ID: CWE-200 - Information exposure

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to urllib does not strip the "Cookie" HTTP header during cross-origin HTTP redirects. A remote attacker can gain unauthorized access to sensitive information.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

14) Inefficient Algorithmic Complexity

EUVDB-ID: #VU82548

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46136

CWE-ID: CWE-407 - Inefficient Algorithmic Complexity

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to high resource usage when parsing multipart/form-data. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) LDAP injection

EUVDB-ID: #VU78328

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-33201

CWE-ID: CWE-90 - Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to improper input validation in applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability. A remote non-authenticated attacker can use a specially crafted X.509 certificate to bypass authentication process and gain unauthorized access to the application.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Incorrect default permissions

EUVDB-ID: #VU77107

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-2976

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions in com.google.common.io.FileBackedOutputStream. A local user with access to the system can view contents of files and directories or modify them.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Allocation of Resources Without Limits or Throttling

EUVDB-ID: #VU82454

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-43642

CWE-ID: CWE-770 - Allocation of Resources Without Limits or Throttling

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to missing upper bound check on chunk length. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Integer overflow

EUVDB-ID: #VU77361

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-34454

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in compress. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Resource exhaustion

EUVDB-ID: #VU77362

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-34455

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Integer overflow

EUVDB-ID: #VU77359

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-34453

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow in shuffle. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.

Mitigation

The following software releases have been updated to resolve these specific issues:

  • Disconnected Log Collector v1.8.4 and all subsequent releases.
  • SOAR Plugin App 5.3.1 and all subsequent releases.
  • Intelligence app 3.0.12 and all subsequent releases.
  • Behavior Analytics application add on 4.1.14 and all subsequent releases.

Vulnerable software versions

Juniper Secure Analytics (JSA): 7.5.0 - 7.5.0 UP7 IF03

External links

http://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###