Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36845 PoC — Juniper Networks Junos OS EX 安全漏洞

Source
Associated Vulnerability
Title:Juniper Networks Junos OS EX 安全漏洞 (CVE-2023-36845)
Description:Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
Description
Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)
Readme
ansible-cve-2023-36845
======================

Simple and untested Ansible Playbook for discovring potential CVE-2023-36845.

```
ansible-playbook -i inventory cve-2023-36845.yml
```

Use the ```ansible.cfg``` to limit the output from displaying skipped hosts.
File Snapshot

[4.0K] /data/pocs/7185f7edefbdf60e3dea775ea8d35b6c47a5527d ├── [ 38] ansible.cfg ├── [1.1K] cve-2023-36845.yml ├── [ 60] inventory └── [ 261] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.