Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36845 PoC — Juniper Networks Junos OS EX 安全漏洞

Source
Associated Vulnerability
Title:Juniper Networks Junos OS EX 安全漏洞 (CVE-2023-36845)
Description:Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
Description
Simple Automation script for juniper cve-2023-36845
Readme
# Automation for Juniper CVE:2023-36845
## Overview
is a bash script designed to check for the CVE-2023-36845 vulnerability. This script processes a list of IP addresses, sends a request to each, and determines whether the system is vulnerable based on the response.

## Usage
To use the script, run it from the command line with the following options:

```bash
chmod +x exploit.sh
./exploit.sh -f ip_list.txt
```
[Automation Hacks: Unearthing a Critical RCE the Easy Way](https://asbawy.medium.com/automation-hacks-unearthing-a-critical-rce-the-easy-way-ad64f01a06a3)
File Snapshot

[4.0K] /data/pocs/a7ee09e5a7f3b993145563e2368c7d34a30d308e ├── [1.9K] cve-2023-36845.sh └── [ 569] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.