vendor:
Juniper SRX Firewalls, Juniper EX Switches
by:
whiteOwl
6.1
CVSS
HIGH
Remote Code Execution (RCE)
94
CWE
Product Name: Juniper SRX Firewalls, Juniper EX Switches
Affected Version From: Versions prior to 20.4R3-S9, 21.1R1, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R2-S2/R3-S1, 22.4R2-S1/R3, 23.2R1-S1/R2
Affected Version To: Not specified
Patch Exists: YES
Related CWE: CVE-2023-36845
CPE: a:juniper_networks:srx_firewalls cpe:/a:juniper_networks:ex_switches
Platforms Tested: JUNOS SM804122pri 15.1X49-D170.4
2023
Juniper SRX Firewalls & EX Switches PreAuth RCE
The vulnerability allows an attacker to execute the phpinfo() function on the login page of the target device, enabling them to inspect the PHP configuration. The exploit also provides an option to save the phpinfo() output to a file for further analysis. This code serves as both a vulnerability detector and a proof of concept for CVE-2023-36845.
Mitigation:
Update to versions 20.4R3-S9, 21.1R1, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R2-S2/R3-S1, 22.4R2-S1/R3, 23.2R1-S1/R2 or later. Restrict network access to the affected devices.