Skip to main content

CVE-2023-36846

Description

A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.

With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of

integrity

for a certain 

part of the file system, which may allow chaining to other vulnerabilities.

This issue affects Juniper Networks Junos OS on SRX Series:

* All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions

prior to

21.3R3-S5; * 21.4 versions

prior to

21.4R3-S5; * 22.1 versions

prior to

22.1R3-S3; * 22.2 versions

prior to

22.2R3-S2; * 22.3 versions

prior to

22.3R2-S2, 22.3R3; * 22.4 versions

prior to

22.4R2-S1, 22.4R3.

NVD
Severity: N/A
CVE ID: CVE-2023-36846
CVSS Score: N/A
CVSS Metrics: NVD assessment not yet provided.
Juniper Networks, Inc.
Severity: MEDIUM
CVE ID: CVE-2023-36846
CVSS Score: 5.3
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Refrence: NVDMITRE

Proof Of Concept

Chocapikk

Remote Code Execution on Junos OS CVE-2023-36846

Refrence: GitHub

Content on GitHub

r3dcl1ff | watchers:2

CVE-2023-36844_Juniper_RCE
A Proof of Concept for chaining the CVEs [CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847] to achieve Remote Code Execution (phpinfo) in Juniper JunOS within SRX and EX Series products.Modified from original exploit developed by @watchTowr .

Refrence: GitHub

iveresk | watchers:0

CVE-2023-36845-6-
CVE-2023-36845 и CVE-2023-36846 Juniper Junos OS J-Web RCE

Refrence: GitHub