QID 730925
Date Published: 2023-09-27
QID 730925: Juniper Network Operating System (Junos OS) Remote Code Execution (RCE) Vulnerability (JSA72300) (Unauthenticated Check)
Juniper Junos is the network operating system used in Juniper Networks hardware systems.
CVE-2023-36845: A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain, important environments variables. Utilizing a crafted request an attacker is able to modify a certain PHP environment variable leading to partial loss of integrity, which may allow chaining to other vulnerabilities.
The issue affect Juniper Networks Junos OS on SRX Series for the following versions:
All versions prior to 20.4R3-S8
21.1 version 21.1R1 and later versions
21.2 versions prior to 21.2R3-S6
21.3 versions prior to 21.3R3-S5
21.4 versions prior to 21.4R3-S5
22.1 versions prior to 22.1R3-S3
22.2 versions prior to 22.2R3-S2
22.3 versions prior to 22.3R2-S2, 22.3R3
22.4 versions prior to 22.4R2-S1, 22.4R3
The issue affect Juniper Networks Junos OS on EX Series for the following versions:
All versions prior to 20.4R3-S8
21.1 version 21.1R1 and later versions
21.2 versions prior to 21.2R3-S6
21.3 versions prior to 21.3R3-S5
21.4 versions prior to 21.4R3-S4
22.1 versions prior to 22.1R3-S3
22.2 versions prior to 22.2R3-S1
22.3 versions prior to 22.3R2-S2, 22.3R3
22.4 versions prior to 22.4R2-S1, 22.4R3
QID detection logic: (Unauthenticated)
This QID sends a crafted payload to the Juniper Server and checks for code execution.
Successful exploitation of the vulnerability may allow a remote attacker to execute arbitrary code.
- JSA71542 -
supportportal.juniper.net/JSA72300
CVEs related to QID 730925
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| JSA72300 |
|