mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-06 10:41:40 +00:00
Update GobyVuls-Document.md
This commit is contained in:
parent
146c83d7ca
commit
617bd902bc
@ -1,7 +1,21 @@
|
||||
# Goby History Update Vulnerability Total Document (Continuously Update)
|
||||
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
|
||||
|
||||
**Updated document date: September 7, 2023**
|
||||
**Updated document date: September 14, 2023**
|
||||
|
||||
## Junos webauth_operation.php File Upload Vulnerability (CVE-2023-36844)
|
||||
|
||||
| **Vulnerability** | Junos webauth_operation.php File Upload Vulnerability (CVE-2023-36844) |
|
||||
| :----: | :-----|
|
||||
| **Chinese name** | Junos webauth_operation.php 文件上传漏洞(CVE-2023-36844) |
|
||||
| **CVSS core** | 9.8 |
|
||||
| **FOFA Query** (click to view the results directly)| [title="Juniper Web Device Manager" \|\| banner="juniper" \|\| header="juniper" \|\| body="svg4everybody/svg4everybody.js" \|\| body="juniper.net/us/en/legal-notices" \|\| body="nativelogin_login_credentials"](https://en.fofa.info/result?qbase64=dGl0bGU9Ikp1bmlwZXIgV2ViIERldmljZSBNYW5hZ2VyIiB8fCBiYW5uZXI9Imp1bmlwZXIiIHx8IGhlYWRlcj0ianVuaXBlciIgfHwgYm9keT0ic3ZnNGV2ZXJ5Ym9keS9zdmc0ZXZlcnlib2R5LmpzIiB8fCBib2R5PSJqdW5pcGVyLm5ldC91cy9lbi9sZWdhbC1ub3RpY2VzIiB8fCBib2R5PSJuYXRpdmVsb2dpbl9sb2dpbl9jcmVkZW50aWFscyI%3D) |
|
||||
| **Number of assets affected** | 47518 |
|
||||
| **Description** | Junos is a reliable, high-performance network operating system from Juniper Networks.An attacker can use the J-Web service /webauth_operation.php route of the Junos operating system to upload a php webshell, include it through the ?PHPRC parameter, and gain control of the entire web server. |
|
||||
| **Impact** | Attackers can use this vulnerability to execute code on the server side, write backdoors, obtain server permissions, and then control the entire web server. |
|
||||
|
||||

|
||||
|
||||
|
||||
## Weaver ecology XmlRpcServlet Path File Read Vulnerability
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user