CVE-2018-0023

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-0023
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-0023.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-0023
Aliases
Published
2018-04-11T19:29:00Z
Modified
2024-09-03T02:00:26.857518Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.

References

Affected packages

Git / github.com/juniper/jsnapy

Affected ranges

Type
GIT
Repo
https://github.com/juniper/jsnapy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.1.0
1.2.0
1.2.1
1.2.2

v0.*

v0.1-beta
v0.1.1-beta
v0.1.2-beta
v0.1.3-beta
v0.1.4-beta
v0.1.5-beta
v0.1.6-beta
v0.1.7-beta
v0.1.8-beta
v0.1.9-beta

v1.*

v1.0.0