Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36845 PoC — Juniper Networks Junos OS EX 安全漏洞

Source
Associated Vulnerability
Title:Juniper Networks Junos OS EX 安全漏洞 (CVE-2023-36845)
Description:Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
Readme
Automation for Juniper CVE:2023-36845

Overview

This is a bash script designed to check for the CVE-2023-36845 vulnerability. This script processes a list of IP addresses, sends a request to each, and determines whether the system is vulnerable based on the response.

Usage
To use the script, run it from the command line with the following options:

`chmod +x cve-2023-36845.sh`
`./cve-2023-36845.sh -f ip_list.txt`
File Snapshot

[4.0K] /data/pocs/d0ea2e06d0e9b63fc96739e636f463f414613564 ├── [1.8K] cve-2023-36845.sh ├── [ 34K] LICENSE └── [ 419] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.