Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36845 PoC — Juniper Networks Junos OS EX 安全漏洞

Source
Associated Vulnerability
Title:Juniper Networks Junos OS EX 安全漏洞 (CVE-2023-36845)
Description:Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
Readme
# Juniper Scanner
Scanner for CVE-2023-36845 by bt0

More information about the Vulnerability:
https://supportportal.juniper.net/JSA72300

[![License: GPL v3](https://img.shields.io/badge/License-GPL%20v3-blue.svg)](http://www.gnu.org/licenses/gpl-3.0)

## Requirements:
--------------------

- python3+
- shodan
- colorama
- urlopen
- pyOpenSSL
- censys

  * $ python3 -m pip install -r requirements.txt

## Options
--------------

```
-h, --help            show this help message and exit
-H HOST, --host HOST  IP or Hostname of target
-p PORT, --port PORT  Port of target. Default=443
-hl HOSTLIST, --hostlist HOSTLIST
                      Use a hosts list e.g. ./hosts.txt
-s, --shodan          Search for hosts in Shodan (Needs api key)
--censys results [page ...]
                        Search for hosts in Censys (Needs api key). Use --censys <results> <per_page>

--version             show program's version number and exit
```

## For Shodan Search
--------------------

You should buy a shodan subscription to have access to API key
Visit https://account.shodan.io/billing for more information

## For Censys Search
--------------------

Just register to Censys search to acquire an API key
https://censys.io/register

To setup your credentials and execute the script, use environment variables on linux
```
$ export CENSYS_API_ID=<your-api-id>
$ export CENSYS_API_SECRET=<your-api-secret>
```

## Disclaimer
--------------

This is published for educational and informational purposes only, and the developers accept no responsibility for the use of it by users.
Our team will not aid, or endorse any use of this exploit for malicious activity, thus if you ask for help you may be required to provide us with proof that you either own the target service or you have permissions to pentest on it.
File Snapshot

[4.0K] /data/pocs/e265031f96384f97d20831b42a7615778d5530b7 ├── [ 342] censysmod.py ├── [5.7K] juniperscan.py ├── [1.8K] README.md └── [ 40] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.