CVE-2018-0023

Junos Snapshot Administrator (JSNAPy) world writeable default configuration file permission

Description

JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.

Remediation

Solution:

  • This issue is resolved in 1.3.0 and subsequent releases. Fixed JSNAPy releases can be downloaded from https://github.com/Juniper/jsnapy/releases.
  • Upgrading to the fixed release is not sufficient to resolve the issue, modifying file permission after upgrade as described in the workaround section is required. This issue is fixed for fresh/new installation.

Workaround:

  • The workaround is to change the related files and directory to group/world to readable, but not writable: # sudo chmod -R og-w /etc/jsnapy # ls -l /etc/jsnapy/ total 20 -rwxr-xr-x 1 root root 387 Aug 9 2016 jsnapy.cfg -rwxr-xr-x 1 root root 1695 Aug 9 2016 logging.yml drwxr-xr-x 2 root root 4096 Aug 26 2016 samples drwxr-xr-x 2 root root 4096 Aug 26 2016 snapshots drwxr-xr-x 2 root root 4096 Aug 26 2016 testfiles

Category

5.5
CVSS
Severity: Medium
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.04%
Vendor Advisory juniper.net
Affected: Juniper Networks Junos Snapshot Administrator (JSNAPy)
Published at:
Updated at:

References

Link Tags
https://kb.juniper.net/JSA10856 mitigation vendor advisory
http://www.securityfocus.com/bid/103745 third party advisory vdb entry

Frequently Asked Questions

What is the severity of CVE-2018-0023?
CVE-2018-0023 has been scored as a medium severity vulnerability.
How to fix CVE-2018-0023?
To fix CVE-2018-0023: This issue is resolved in 1.3.0 and subsequent releases. Fixed JSNAPy releases can be downloaded from https://github.com/Juniper/jsnapy/releases.
Is CVE-2018-0023 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2018-0023 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2018-0023?
CVE-2018-0023 affects Juniper Networks Junos Snapshot Administrator (JSNAPy).
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.