An arbitrary file download vulnerability in the web interface of Juniper Networks Junos Space allows a network-based authenticated attacker using a crafted GET method to access any file on the file system. Using specially crafted GET methods, an attacker can gain access to files beyond the file path normally allowed by the JBoss daemon. These files could contain sensitive information restricted from access by low-privileged users.This issue affects all versions of Junos Space before 24.1R3.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA103170 |
![]() ![]() |
History
Thu, 09 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 09 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An arbitrary file download vulnerability in the web interface of Juniper Networks Junos Space allows a network-based authenticated attacker using a crafted GET method to access any file on the file system. Using specially crafted GET methods, an attacker can gain access to files beyond the file path normally allowed by the JBoss daemon. These files could contain sensitive information restricted from access by low-privileged users.This issue affects all versions of Junos Space before 24.1R3. | |
Title | Junos Space: Arbitrary file download vulnerability in web interface | |
Weaknesses | CWE-552 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-10-09T19:49:14.069Z
Reserved: 2025-09-23T18:19:06.956Z
Link: CVE-2025-59976

Updated: 2025-10-09T19:43:30.203Z

Status : Received
Published: 2025-10-09T16:15:47.487
Modified: 2025-10-09T16:15:47.487
Link: CVE-2025-59976

No data.

No data.