CVE-2023-36844

Scores

EPSS

0.943high94.3%
0%20%40%60%80%100%

Percentile: 94.3%

CVSS

5.3medium3.x
0246810

CVSS Score: 5.3/10

All CVSS Scores

CVSS 3.x
5.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Description

A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.

Using a crafted request an attacker is able to modify

certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on EX Series:

  • All versions prior to 20.4R3-S9;
  • 21.1 versions 21.1R1 and later;
  • 21.2 versions prior to 21.2R3-S7;
  • 21.3 versions

prior to

21.3R3-S5;
* 21.4 versions

prior to

21.4R3-S5;
* 22.1 versions

prior to

22.1R3-S4;
* 22.2 versions

prior to

22.2R3-S2;
* 22.3 versions

prior to 22.3R3-S1;
* 22.4 versions

prior to

22.4R2-S2, 22.4R3;
* 23.2 versions prior to

23.2R1-S1, 23.2R2.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-473

Related Vulnerabilities

Exploits

Exploit ID: CVE-2023-36844

Source: github-poc

URL: https://github.com/r3dcl1ff/CVE-2023-36844_Juniper_RCE

Vulnerable Software (1)

Type: Configuration

Vendor: juniper

Product: junos

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",          "versionEndExcluding": "20.4",          "vulnerable": true        },...

Source: nvd