vendor:
SRX Firewalls & EX Switches
by:
whiteOwl
6.1
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: SRX Firewalls & EX Switches
Affected Version From: Versions Prior to 20.4R3-S9,21.1R1,21.2R3-S7,21.3R3-S5,21.4R3-S5,22.1R3-S4,22.2R3-S2,22.3R2-S2/R3-S1,22.4R2-S1/R3,23.2R1-S1/R2
Affected Version To: Not provided
Patch Exists: NO
Related CWE: CVE-2023-36845
CPE: a:juniper:networking:20.4R3-S9, 21.1R1, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1, 22.4R2-S1, 22.4R3, 23.2R1-S1, 23.2R2
Platforms Tested: JUNOS SM804122pri 15.1X49-D170.4
2023
Juniper SRX Firewalls & EX Switches Remote Code Execution (Pre-Authentication)
The exploit code serves as a vulnerability checker and proof of concept for CVE-2023-36845. It triggers the phpinfo() function on the login page of the target device, enabling inspection of the PHP configuration. The script also provides the option to save the phpinfo() output for further analysis.
Mitigation:
To mitigate this vulnerability, it is recommended to update the affected Juniper SRX Firewalls and EX Switches to versions 20.4R3-S9, 21.1R1, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R2-S2/R3-S1, 22.4R2-S1/R3, or 23.2R1-S1/R2.