目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2023-36845— Juniper Networks Junos OS EX 安全漏洞

CVSS 9.8 · Critical KEV EPSS 94.36% · P100
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2023-36845の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable
ソース: NVD (National Vulnerability Database)
脆弱性説明
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
PHP参数外部修改
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Juniper Networks Junos OS EX 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

Shenlong 10 Questions — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Juniper NetworksJunos OS 0 ~ 20.4R3-S9 -

II. CVE-2023-36845の公開POC

#POC説明ソースリンクShenlongリンク
1A tool to discover Juniper firewalls vulnerable to CVE-2023-36845https://github.com/vulncheck-oss/cve-2023-36845-scannerPOC詳細
2Juniper Firewalls CVE-2023-36845 - RCEhttps://github.com/kljunowsky/CVE-2023-36845POC詳細
3PoC CVE-2023-36845 on Juniper Devicehttps://github.com/toanln-cov/CVE-2023-36845POC詳細
4Nonehttps://github.com/halencarjunior/CVE-2023-36845POC詳細
5CVE-2023-36845 - Juniper Firewall Remote code execution (RCE)https://github.com/zaenhaxor/CVE-2023-36845POC詳細
6Nonehttps://github.com/simrotion13/CVE-2023-36845POC詳細
7PoC & vulnerability detector for Juniper EX switches and SRX firewallshttps://github.com/WhiteOwl-Pub/PoC-Vuln-Detector-juniper-cve-2023-36845POC詳細
8CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution.https://github.com/cyberh3als/CVE-2023-36845-POCPOC詳細
9Ansible Playbook for CVE-2023-36845https://github.com/ditekshen/ansible-cve-2023-36845POC詳細
10proof of Concept and Vulnerability Detector for CVE-2023-36845https://github.com/WhiteOwl-Pub/Juniper-PoC-CVE-2023-36845POC詳細
11Simple Automation script for juniper cve-2023-36845https://github.com/Asbawy/Automation-for-Juniper-cve-2023-36845POC詳細
12Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.https://github.com/jahithoque/Juniper-CVE-2023-36845-Mass-HuntingPOC詳細
13Nonehttps://github.com/cyb3rzest/Juniper-Bug-Automation-CVE-2023-36845POC詳細
14Nonehttps://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845POC詳細
15CVE-2023-36845 и CVE-2023-36846 Juniper Junos OS J-Web RCEhttps://github.com/iveresk/CVE-2023-36845-6-POC詳細
16CVES https://github.com/ak1t4/CVE-2023-36845POC詳細
17This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection.https://github.com/0xNehru/CVE-2023-36845-Juniper-VulnerabilityPOC詳細
18Juniper - Remote Code Execution (CVE-2023-36845) PreAuth-RCE Exploitshttps://github.com/imhunterand/CVE-2023-36845POC詳細
19A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. https://github.com/ifconfig-me/CVE-2023-36845POC詳細
20CVE-2023-36845 – Unauthenticated Juniper Remote Code Execution Vulnerability Scannerhttps://github.com/e11i0t4lders0n/CVE-2023-36845POC詳細
21Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)https://github.com/CKevens/ansible-cve-2023-36845POC詳細
22Nonehttps://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845POC詳細
23Nonehttps://github.com/Vignesh2712/utomation-for-Juniper-cve-2023-36845POC詳細
24Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)https://github.com/3yujw7njai/ansible-cve-2023-36845POC詳細
25Juniper Networks POC Understanding CVE-2023–36845 Remote Code Execution Exploit and Protectionhttps://github.com/functionofpwnosec/CVE-2023-36845POC詳細
26A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845 cve-2023-36845, go-exploithttps://github.com/meekchest/cve-2023-36845-scannerPOC詳細
27Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)https://github.com/AiK1d/ansible-cve-2023-36845POC詳細
28A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain environments variables to execute remote commands https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-36845.yamlPOC詳細
29Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)https://github.com/P4x1s/ansible-cve-2023-36845POC詳細
30Juniper JunOS J-Web PHP external variable modification (CVE-2023-36845) exploit.https://github.com/kopfjager007/CVE-2023-36845POC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2023-36845のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2023-08-17 · 4 CVEs total

CVE-2023-368465.3 MEDIUMJunos OS: SRX Series: A vulnerability in J-Web allows an unauthenticated attacker to uploa
CVE-2023-368445.3 MEDIUMJunos OS: EX Series: A PHP vulnerability in J-Web allows an unauthenticated attacker to co
CVE-2023-368475.3 MEDIUMJunos OS: EX Series: A vulnerability in J-Web allows an unauthenticated attacker to upload

IV. 関連脆弱性

V. CVE-2023-36845へのコメント

まだコメントはありません


コメントを残す