GobyVuls/Junos_webauth_operation.php_File_Upload_Vulnerability.md

13 lines
1.4 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

## Junos webauth_operation.php File Upload Vulnerability (CVE-2023-36844)
| **Vulnerability** | Junos webauth_operation.php File Upload Vulnerability (CVE-2023-36844) |
| :----: | :-----|
| **Chinese name** | Junos webauth_operation.php 文件上传漏洞CVE-2023-36844 |
| **CVSS core** | 9.8 |
| **FOFA Query** (click to view the results directly)| [title="Juniper Web Device Manager" \|\| banner="juniper" \|\| header="juniper" \|\| body="svg4everybody/svg4everybody.js" \|\| body="juniper.net/us/en/legal-notices" \|\| body="nativelogin_login_credentials"](https://en.fofa.info/result?qbase64=dGl0bGU9Ikp1bmlwZXIgV2ViIERldmljZSBNYW5hZ2VyIiB8fCBiYW5uZXI9Imp1bmlwZXIiIHx8IGhlYWRlcj0ianVuaXBlciIgfHwgYm9keT0ic3ZnNGV2ZXJ5Ym9keS9zdmc0ZXZlcnlib2R5LmpzIiB8fCBib2R5PSJqdW5pcGVyLm5ldC91cy9lbi9sZWdhbC1ub3RpY2VzIiB8fCBib2R5PSJuYXRpdmVsb2dpbl9sb2dpbl9jcmVkZW50aWFscyI%3D) |
| **Number of assets affected** | 47518 |
| **Description** | Junos is a reliable, high-performance network operating system from Juniper Networks.An attacker can use the J-Web service /webauth_operation.php route of the Junos operating system to upload a php webshell, include it through the ?PHPRC parameter, and gain control of the entire web server. |
| **Impact** | Attackers can use this vulnerability to execute code on the server side, write backdoors, obtain server permissions, and then control the entire web server. |
![](https://s3.bmp.ovh/imgs/2023/09/14/58f32076aab47bc2.gif)