POC详情: e265031f96384f97d20831b42a7615778d5530b7

来源
关联漏洞
标题: Juniper Networks Junos OS EX 安全漏洞 (CVE-2023-36845)
描述:Juniper Networks Junos OS EX是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS EX存在安全漏洞,该漏洞源于J-Web模块存在PHP外部变量修改漏洞。
介绍
# Juniper Scanner
Scanner for CVE-2023-36845 by bt0

More information about the Vulnerability:
https://supportportal.juniper.net/JSA72300

[![License: GPL v3](https://img.shields.io/badge/License-GPL%20v3-blue.svg)](http://www.gnu.org/licenses/gpl-3.0)

## Requirements:
--------------------

- python3+
- shodan
- colorama
- urlopen
- pyOpenSSL
- censys

  * $ python3 -m pip install -r requirements.txt

## Options
--------------

```
-h, --help            show this help message and exit
-H HOST, --host HOST  IP or Hostname of target
-p PORT, --port PORT  Port of target. Default=443
-hl HOSTLIST, --hostlist HOSTLIST
                      Use a hosts list e.g. ./hosts.txt
-s, --shodan          Search for hosts in Shodan (Needs api key)
--censys results [page ...]
                        Search for hosts in Censys (Needs api key). Use --censys <results> <per_page>

--version             show program's version number and exit
```

## For Shodan Search
--------------------

You should buy a shodan subscription to have access to API key
Visit https://account.shodan.io/billing for more information

## For Censys Search
--------------------

Just register to Censys search to acquire an API key
https://censys.io/register

To setup your credentials and execute the script, use environment variables on linux
```
$ export CENSYS_API_ID=<your-api-id>
$ export CENSYS_API_SECRET=<your-api-secret>
```

## Disclaimer
--------------

This is published for educational and informational purposes only, and the developers accept no responsibility for the use of it by users.
Our team will not aid, or endorse any use of this exploit for malicious activity, thus if you ask for help you may be required to provide us with proof that you either own the target service or you have permissions to pentest on it.
文件快照

[4.0K] /data/pocs/e265031f96384f97d20831b42a7615778d5530b7 ├── [ 342] censysmod.py ├── [5.7K] juniperscan.py ├── [1.8K] README.md └── [ 40] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。