Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-36845
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable
Source: NVD (National Vulnerability Database)
Vulnerability Description
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
PHP参数外部修改
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS EX 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 0 ~ 20.4R3-S9 -
II. Public POCs for CVE-2023-36845
#POC DescriptionSource LinkShenlong Link
1A tool to discover Juniper firewalls vulnerable to CVE-2023-36845https://github.com/vulncheck-oss/cve-2023-36845-scannerPOC Details
2Juniper Firewalls CVE-2023-36845 - RCEhttps://github.com/kljunowsky/CVE-2023-36845POC Details
3PoC CVE-2023-36845 on Juniper Devicehttps://github.com/toanln-cov/CVE-2023-36845POC Details
4Nonehttps://github.com/halencarjunior/CVE-2023-36845POC Details
5CVE-2023-36845 - Juniper Firewall Remote code execution (RCE)https://github.com/zaenhaxor/CVE-2023-36845POC Details
6Nonehttps://github.com/simrotion13/CVE-2023-36845POC Details
7PoC & vulnerability detector for Juniper EX switches and SRX firewallshttps://github.com/WhiteOwl-Pub/PoC-Vuln-Detector-juniper-cve-2023-36845POC Details
8CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution.https://github.com/cyberh3als/CVE-2023-36845-POCPOC Details
9Ansible Playbook for CVE-2023-36845https://github.com/ditekshen/ansible-cve-2023-36845POC Details
10proof of Concept and Vulnerability Detector for CVE-2023-36845https://github.com/WhiteOwl-Pub/Juniper-PoC-CVE-2023-36845POC Details
11Simple Automation script for juniper cve-2023-36845https://github.com/Asbawy/Automation-for-Juniper-cve-2023-36845POC Details
12Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.https://github.com/jahithoque/Juniper-CVE-2023-36845-Mass-HuntingPOC Details
13Nonehttps://github.com/cyb3rzest/Juniper-Bug-Automation-CVE-2023-36845POC Details
14Nonehttps://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845POC Details
15CVE-2023-36845 и CVE-2023-36846 Juniper Junos OS J-Web RCEhttps://github.com/iveresk/CVE-2023-36845-6-POC Details
16CVES https://github.com/ak1t4/CVE-2023-36845POC Details
17This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection.https://github.com/0xNehru/CVE-2023-36845-Juniper-VulnerabilityPOC Details
18Juniper - Remote Code Execution (CVE-2023-36845) PreAuth-RCE Exploitshttps://github.com/imhunterand/CVE-2023-36845POC Details
19A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. https://github.com/ifconfig-me/CVE-2023-36845POC Details
20CVE-2023-36845 – Unauthenticated Juniper Remote Code Execution Vulnerability Scannerhttps://github.com/e11i0t4lders0n/CVE-2023-36845POC Details
21Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)https://github.com/CKevens/ansible-cve-2023-36845POC Details
22Nonehttps://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845POC Details
23Nonehttps://github.com/Vignesh2712/utomation-for-Juniper-cve-2023-36845POC Details
24Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)https://github.com/3yujw7njai/ansible-cve-2023-36845POC Details
25Juniper Networks POC Understanding CVE-2023–36845 Remote Code Execution Exploit and Protectionhttps://github.com/functionofpwnosec/CVE-2023-36845POC Details
26A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845 cve-2023-36845, go-exploithttps://github.com/meekchest/cve-2023-36845-scannerPOC Details
27Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)https://github.com/AiK1d/ansible-cve-2023-36845POC Details
28A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain environments variables to execute remote commands https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-36845.yamlPOC Details
29Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)https://github.com/P4x1s/ansible-cve-2023-36845POC Details
30Juniper JunOS J-Web PHP external variable modification (CVE-2023-36845) exploit.https://github.com/kopfjager007/CVE-2023-36845POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-36845
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-36845

No comments yet


Leave a comment