An Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in J-Web shipped with Juniper Networks Junos OS allows an unauthenticated, network-based attacker to execute remote commands on the target device.
While an administrator is logged into a J-Web session or has previously logged in and subsequently logged out of their J-Web session, the attacker can arbitrarily execute commands on the target device with the other user's credentials. In the worst case, the attacker will have full control over the device.
This issue affects Junos OS:
* All versions before 21.2R3-S8,
* from 21.4 before 21.4R3-S7,
* from 22.2 before 22.2R3-S4,
* from 22.3 before 22.3R3-S3,
* from 22.4 before 22.4R3-S2,
* from 23.2 before 23.2R2,
* from 23.4 before 23.4R1-S1, 23.4R2.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
22 Jan 2026, 21:19
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.juniper.net/support/downloads/?p=283 - Patch, Product | |
| References | () https://supportportal.juniper.net/JSA83023 - Vendor Advisory | |
| References | () https://www.first.org/cvss/calculator/v4-0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/AU:Y/R:I/V:C/RE:L/U:Amber - Vendor Advisory | |
| First Time |
Juniper srx5600
Juniper ex4100-h Juniper srx1500 Juniper ex4650 Juniper ex2300 Juniper Juniper ex4100 Juniper srx320 Juniper ex9214 Juniper srx5400 Juniper junos Juniper srx2300 Juniper ex3400 Juniper srx4120 Juniper ex4100-f Juniper srx5800 Juniper srx4300 Juniper srx345 Juniper ex9208 Juniper srx340 Juniper j-web Juniper srx4100 Juniper ex4300 Juniper srx4700 Juniper srx4600 Juniper ex4600 Juniper ex9204 Juniper srx1600 Juniper srx380 Juniper srx300 Juniper srx4200 Juniper ex2300-c Juniper ex4400 Juniper ex4000 |
|
| CPE | cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4000:-:*:*:*:*:*:*:* cpe:2.3:a:juniper:j-web:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:* cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3-s2:*:*:*:*:*:* cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:* cpe:2.3:h:juniper:ex4100-h:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:* cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:* cpe:2.3:h:juniper:ex4100:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:* cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:* cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:* cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:* cpe:2.3:h:juniper:ex4100-f:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:srx4120:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:* cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:* cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* |
21 Nov 2024, 09:28
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.juniper.net/support/downloads/?p=283 - | |
| References | () https://supportportal.juniper.net/JSA83023 - | |
| References | () https://www.first.org/cvss/calculator/v4-0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/AU:Y/R:I/V:C/RE:L/U:Amber - |
11 Jul 2024, 13:05
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Jul 2024, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-07-10 23:15
Updated : 2026-01-22 21:19
NVD link : CVE-2024-39565
Mitre link : CVE-2024-39565
CVE.ORG link : CVE-2024-39565
JSON object : View
Products Affected
juniper
- ex9214
- ex4300
- srx380
- ex9208
- ex4400
- ex4650
- srx340
- srx4100
- ex4600
- srx5800
- junos
- ex2300-c
- ex4100
- ex2300
- srx4300
- srx300
- ex9204
- srx320
- srx4700
- srx4200
- srx345
- srx4120
- srx2300
- j-web
- srx5400
- ex4100-f
- ex4000
- srx1600
- ex3400
- srx4600
- srx1500
- ex4100-h
- srx5600
CWE
CWE-643
Improper Neutralization of Data within XPath Expressions ('XPath Injection')
