关联漏洞
描述
CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution.
介绍
**CVE-2023-36845 PoC Automation Script**
This script provides an automated Proof of Concept (PoC) for the vulnerability identified as CVE-2023-36845, which affects the J-Web component of Juniper Networks Junos OS on EX and SRX Series devices. It demonstrates the potential for remote modification of the PHPRC variable in the PHP environment, which can lead to code injection and execution.
**
Prerequisites**
Python 3.x
Required : requests==2.26.0
**
Installation**
1. Clone the repository: git clone https://github.com/cyberh3als/CVE-2023-36845-POC.git
2. cd [YOUR_DIRECTORY_NAME]
3. Install the required libraries: pip install -r requirements.txt
4. Usage: python3 CVE-2023-36845-POC.py
**Warning**
Use this script responsibly. Ensure you have explicit permission to test against any target systems. Unauthorized testing can lead to legal consequences.
**Contributing**
Pull requests are welcome. For major changes, please open an issue first to discuss what you'd like to change.
文件快照
[4.0K] /data/pocs/79bd9ea1d3ef0c5b0e9be3d9d27d60a74a35695e
├── [1.3K] CVE-2023-36845-POC.py
├── [ 34K] LICENSE
├── [ 987] README.md
└── [ 18] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。