CVE-2023-36845

CRITICAL KEV NUCLEI

Juniper Networks Junos OS - RCE

Title source: llm

Description

A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.

Exploits (24)

nomisec SCANNER 62 stars
by vulncheck-oss · local
https://github.com/vulncheck-oss/cve-2023-36845-scanner
nomisec WORKING POC 54 stars
by kljunowsky · infoleak
https://github.com/kljunowsky/CVE-2023-36845
nomisec SCANNER 19 stars
by Asbawy · infoleak
https://github.com/Asbawy/Automation-for-Juniper-cve-2023-36845
nomisec SCANNER 5 stars
by ak1t4 · remote
https://github.com/ak1t4/CVE-2023-36845
nomisec WORKING POC 4 stars
by cyberh3als · remote
https://github.com/cyberh3als/CVE-2023-36845-POC
nomisec SCANNER 3 stars
by zaenhaxor · infoleak
https://github.com/zaenhaxor/CVE-2023-36845
github WORKING POC 2 stars
by Pr0t0c01 · pythonpoc
https://github.com/Pr0t0c01/CVEs/tree/main/Juniper_CVE-2023-36845
nomisec SCANNER 1 stars
by e11i0t4lders0n · poc
https://github.com/e11i0t4lders0n/CVE-2023-36845
nomisec SCANNER 1 stars
by jahithoque · remote
https://github.com/jahithoque/Juniper-CVE-2023-36845-Mass-Hunting
nomisec SCANNER 1 stars
by simrotion13 · infoleak
https://github.com/simrotion13/CVE-2023-36845
nomisec SCANNER 1 stars
by halencarjunior · infoleak
https://github.com/halencarjunior/CVE-2023-36845
nomisec WORKING POC
by kopfjager007 · remote
https://github.com/kopfjager007/CVE-2023-36845
nomisec WORKING POC
by ifconfig-me · infoleak
https://github.com/ifconfig-me/CVE-2023-36845
nomisec WORKING POC
by 0xNehru · remote
https://github.com/0xNehru/CVE-2023-36845-Juniper-Vulnerability
nomisec WORKING POC
by iveresk · remote
https://github.com/iveresk/CVE-2023-36845-6-
nomisec WORKING POC
by CharonDefalt · remote
https://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845
nomisec SCANNER
by cyb3rzest · remote
https://github.com/cyb3rzest/Juniper-Bug-Automation-CVE-2023-36845
nomisec SCANNER
by P4x1s · poc
https://github.com/P4x1s/ansible-cve-2023-36845
nomisec NO CODE
by toanln-cov · poc
https://github.com/toanln-cov/CVE-2023-36845
vulncheck_xdb WORKING POC
remote
https://github.com/r3dcl1ff/CVE-2023-36844_Juniper_RCE
vulncheck_xdb WORKING POC
remote
https://github.com/watchtowrlabs/juniper-rce_cve-2023-36844
vulncheck_xdb STUB
infoleak
https://github.com/PortSwigger/BChecks
metasploit WORKING POC EXCELLENT
by Jacob Baines, Ron Bowes, jheysel-r7, Fabian Hafner · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/freebsd/http/junos_phprc_auto_prepend_file.rb

Nuclei Templates (1)

Juniper J-Web - Remote Code Execution
CRITICALVERIFIEDby yaser_s
Shodan: title:"Juniper Web Device Manager" || http.title:"juniper web device manager"
FOFA: title="juniper web device manager"

Scores

CVSS v3 9.8
EPSS 0.9435
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2023-11-13
VulnCheck KEV 2023-08-29
InTheWild.io 2023-11-08
ENISA EUVD EUVD-2023-40765
CWE
CWE-473
Status published
Products (4)
juniper/junos 20.4 (15 CPE variants)
juniper/junos 21.1 r1 (11 CPE variants)
juniper/junos 21.2 (14 CPE variants)
juniper/junos 21.3 (10 CPE variants)
Published Aug 17, 2023
KEV Added Nov 13, 2023
Tracked Since Feb 18, 2026