{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-36845", "ASSIGNER": "sirt@juniper.net", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\nand SRX Series \n\nallows an unauthenticated, network-based attacker to remotely execute code.\n\nUsing a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code.\n\n\nThis issue affects Juniper Networks Junos OS on EX Series\n\n\nand \n\n\nSRX Series:\n\n\n\n * All versions prior to \n\n20.4R3-S9;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to\u00a021.2R3-S7;\n * 21.3 versions prior to\u00a021.3R3-S5;\n * 21.4 versions prior to 21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S4;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;\n * 23.2 versions prior to 23.2R1-S1, 23.2R2.\n\n\n\n\n" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-473 PHP External Variable Modification", "cweId": "CWE-473" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Juniper Networks", "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", "version_value": "20.4R3-S9" }, { "version_affected": "<", "version_name": "21.1", "version_value": "21.1*" }, { "version_affected": "<", "version_name": "21.2", "version_value": "21.2R3-S7" }, { "version_affected": "<", "version_name": "21.3", "version_value": "21.3R3-S5" }, { "version_affected": "<", "version_name": "21.4", "version_value": "21.4R3-S5" }, { "version_affected": "<", "version_name": "22.1", "version_value": "22.1R3-S4" }, { "version_affected": "<", "version_name": "22.2", "version_value": "22.2R3-S2" }, { "version_affected": "<", "version_name": "22.3", "version_value": "22.3R2-S2, 22.3R3-S1" }, { "version_affected": "<", "version_name": "22.4", "version_value": "22.4R2-S1, 22.4R3" }, { "version_affected": "<", "version_name": "23,2", "version_value": "23.2R1-S1, 23.2R2" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://supportportal.juniper.net/JSA72300", "refsource": "MISC", "name": "https://supportportal.juniper.net/JSA72300" }, { "url": "http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html" }, { "url": "http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "defect": [ "1736942" ], "discovery": "EXTERNAL" }, "configuration": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\n\n\n

The following minimal configuration is necessary:

  [system services web-management http]

or

  [system services web-management https]
" } ], "value": "\n\n\n\n\nThe following minimal configuration is necessary:\n\n\u00a0 [system services web-management http]or\n\n\u00a0 [system services web-management https]\n" } ], "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\nDisable J-Web, or limit access to only trusted hosts.
" } ], "value": "\n\n\nDisable J-Web, or limit access to only trusted hosts.\n" } ], "exploit": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nJuniper SIRT is not aware of any malicious exploitation of this vulnerability.
" } ], "value": "\nJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\n" } ], "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The following software releases have been updated to resolve this specific issue: \n\n20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1*, 22.4R2-S1, 22.4R3*, 23.2R1-S1, 23.2R2*, 23.4R1*, and all subsequent releases.
\n\n*Pending Publication\n\n\n\n
" } ], "value": "The following software releases have been updated to resolve this specific issue: \n\n20.4R3-S9*,\u00a021.2R3-S7*,\u00a021.3R3-S5,\u00a021.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1*, 22.4R2-S1, 22.4R3*, 23.2R1-S1, 23.2R2*,\u00a023.4R1*, and all subsequent releases.\n\n\n*Pending Publication\n\n\n\n\n" } ], "credits": [ { "lang": "en", "value": "LYS, working with DEVCORE Internship Program" } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] } }