Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36845 PoC — Juniper Networks Junos OS EX 安全漏洞

Source
Associated Vulnerability
Title:Juniper Networks Junos OS EX 安全漏洞 (CVE-2023-36845)
Description:Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
Description
CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution.
Readme
**CVE-2023-36845 PoC Automation Script**
This script provides an automated Proof of Concept (PoC) for the vulnerability identified as CVE-2023-36845, which affects the J-Web component of Juniper Networks Junos OS on EX and SRX Series devices. It demonstrates the potential for remote modification of the PHPRC variable in the PHP environment, which can lead to code injection and execution.
**
Prerequisites**
Python 3.x
Required : requests==2.26.0

**
Installation**
1. Clone the repository: git clone https://github.com/cyberh3als/CVE-2023-36845-POC.git
2. cd [YOUR_DIRECTORY_NAME]
3. Install the required libraries: pip install -r requirements.txt
4. Usage: python3 CVE-2023-36845-POC.py

**Warning**
Use this script responsibly. Ensure you have explicit permission to test against any target systems. Unauthorized testing can lead to legal consequences.

**Contributing**
Pull requests are welcome. For major changes, please open an issue first to discuss what you'd like to change.
File Snapshot

[4.0K] /data/pocs/79bd9ea1d3ef0c5b0e9be3d9d27d60a74a35695e ├── [1.3K] CVE-2023-36845-POC.py ├── [ 34K] LICENSE ├── [ 987] README.md └── [ 18] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.