CVE-2021-0220 - Insufficiently Protected Credentials

Severity

68%

Complexity

23%

Confidentiality

66%

The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.

CVSS 3.1 Base Score 6.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).

CVSS 2.0 Base Score 3.5. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).

Demo Examples

Insufficiently Protected Credentials

CWE-522

This code changes a user's password.


               
}
SetUserPassword($user, $pass);

While the code confirms that the requesting user typed the same new password twice, it does not confirm that the user requesting the password change is the same user whose password will be changed. An attacker can request a change of another user's password and gain control of the victim's account.

Insufficiently Protected Credentials

CWE-522

The following code reads a password from a properties file and uses the password to connect to a database.


               
...

This code will run successfully, but anyone who has access to config.properties can read the value of password. If a devious employee has access to this information, they can use it to break into the system.

Insufficiently Protected Credentials

CWE-522

The following code reads a password from the registry and uses the password to create a new network credential.


               
...

This code will run successfully, but anyone who has access to the registry key used to store the password can read the value of password. If a devious employee has access to this information, they can use it to break into the system

Insufficiently Protected Credentials

CWE-522

Both of these examples verify a password by comparing it to a stored compressed version.


               
}
return(1);
return(0);

               
}
return(1);
return(0);
//Diagnostic Mode

Because a compression algorithm is used instead of a one way hashing algorithm, an attacker can recover compressed passwords stored in the database.

Insufficiently Protected Credentials

CWE-522

The following examples show a portion of properties and configuration files for Java and ASP.NET applications. The files include username and password information but they are stored in plaintext.

This Java example shows a properties file with a plaintext username / password pair.


               
...# Java Web App ResourceBundle properties file

The following example shows a portion of a configuration file for an ASP.Net application. This configuration file includes username and password information for a connection to a database but the pair is stored in plaintext.


               
...
<add name="ud_DEV" connectionString="connectDB=uDB; uid=db2admin; pwd=password; dbalias=uDB;" providerName="System.Data.Odbc" />

Username and password information should not be included in a configuration file or a properties file in plaintext as this will allow anyone who can read the file access to the resource. If possible, encrypt this information and avoid CWE-260 and CWE-13.

Overview

Type

Juniper

First reported 4 years ago

2021-01-15 18:15:00

Last updated 4 years ago

2021-01-26 16:02:00

Affected Software

Juniper Junos Space 1.0

1.0

Juniper Junos Space 1.1

1.1

Juniper Junos Space 1.2

1.2

Juniper Junos Space 1.3

1.3

Juniper Junos Space 1.4

1.4

Juniper Junos Space 2.0

2.0

Juniper Junos Space 11.1

11.1

Juniper Junos Space 11.2

11.2

Juniper Junos Space 11.3

11.3

Juniper Junos Space 11.4

11.4

Juniper Junos Space 12.1

12.1

Juniper Junos Space 12.2

12.2

Juniper Junos Space 12.3

12.3

Juniper Junos Space 13.1

13.1

Juniper Junos Space 13.1R1.8

13.1

Juniper Junos Space 15.1 R2

15.1

Juniper Junos Space 15.2 -

15.2

Juniper Junos Space 16.1 -

16.1

Juniper Junos Space 17.1 -

17.1

Juniper Junos Space 17.2 -

17.2

Juniper Junos Space 18.1 -

18.1

Juniper Junos Space 18.2 -

18.2

Juniper Junos Space 18.3 -

18.3

Juniper Junos Space 18.4 -

18.4

Juniper Junos Space 19.1 -

19.1

Juniper JUNOS Space 15.1 R1

15.1

Juniper JUNOS Space 15.2 R1

15.2

Juniper Junos Space 17.2

17.2

Juniper Junos Space 18.1 R1

18.1

Juniper Junos Space 18.2 R1

18.2

Juniper Junos Space 18.3 R1

18.3

Juniper Junos Space 18.4 R1

18.4

Juniper Junos Space 19.1 R1

19.1

Juniper Junos Space 19.2 R1

19.2

Juniper Junos Space 19.3 R1

19.3

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.