{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-36844","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2023-06-27T16:17:25.277Z","datePublished":"2023-08-17T19:17:47.904Z","dateUpdated":"2025-10-21T23:05:40.828Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["EX Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S9","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.1*","status":"affected","version":"21.1","versionType":"semver"},{"lessThan":"21.2R3-S6","status":"affected","version":"21.2","versionType":"semver"},{"lessThan":"21.3R3-S5","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R3-S5","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.1R3-S4","status":"affected","version":"22.1","versionType":"semver"},{"lessThan":"22.2R3-S2","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R3-S1","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"22.4R2-S2, 22.4R3","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R1-S1, 23.2R2","status":"affected","version":"23.2","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following minimal configuration is necessary:</p><code>&nbsp; [system services web-management http]</code><p>or</p><code>&nbsp; [system services web-management https]</code>\n\n\n\n<br>"}],"value":"The following minimal configuration is necessary:\n\n  [system services web-management http]or\n\n  [system services web-management https]"}],"credits":[{"lang":"en","type":"finder","value":"LYS, working with DEVCORE Internship Program"}],"datePublic":"2023-08-17T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.<br><br>Using a crafted request an attacker is able to modify \n\ncertain PHP environment variables&nbsp;leading to partial loss of integrity,&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">which may allow chaining to other vulnerabilities.</span><br><p>This issue affects Juniper Networks Junos OS on EX Series:</p><p></p><ul><li>All versions prior to 20.4R3-S9;</li><li>21.1 versions 21.1R1 and later;</li><li>21.2 versions prior to 21.2R3-S7;</li><li>21.3 versions \n\nprior to \n\n 21.3R3-S5;</li><li>21.4 versions \n\nprior to \n\n21.4R3-S5;</li><li>22.1 versions \n\nprior to \n\n22.1R3-S4;</li><li>22.2 versions \n\nprior to \n\n22.2R3-S2;</li><li>22.3 versions \n\nprior to 22.3R3-S1;</li><li>22.4 versions \n\nprior to \n\n22.4R2-S2, 22.4R3;</li><li>23.2 versions prior to \n\n23.2R1-S1, 23.2R2.</li></ul><p></p>"}],"value":"A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.\n\nUsing a crafted request an attacker is able to modify \n\ncertain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities.\nThis issue affects Juniper Networks Junos OS on EX Series:\n\n\n\n  *  All versions prior to 20.4R3-S9;\n  *  21.1 versions 21.1R1 and later;\n  *  21.2 versions prior to 21.2R3-S7;\n  *  21.3 versions \n\nprior to \n\n 21.3R3-S5;\n  *  21.4 versions \n\nprior to \n\n21.4R3-S5;\n  *  22.1 versions \n\nprior to \n\n22.1R3-S4;\n  *  22.2 versions \n\nprior to \n\n22.2R3-S2;\n  *  22.3 versions \n\nprior to 22.3R3-S1;\n  *  22.4 versions \n\nprior to \n\n22.4R2-S2, 22.4R3;\n  *  23.2 versions prior to \n\n23.2R1-S1, 23.2R2."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-473","description":"CWE-473 PHP External Variable Modification","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2023-10-02T18:06:16.835Z"},"references":[{"tags":["vendor-advisory","mitigation"],"url":"https://supportportal.juniper.net/JSA72300"},{"url":"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: \n\n<span style=\"background-color: rgb(255, 255, 255);\">20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R3-S1*, 22.4R2-S2*, 22.4R3*, 23.2R1-S1, 23.2R2*</span>, 23.4R1*, and all subsequent releases.<br>\n\n*Pending Publication\n\n\n\n<br>"}],"value":"The following software releases have been updated to resolve this specific issue: \n\n20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R3-S1*, 22.4R2-S2*, 22.4R3*, 23.2R1-S1, 23.2R2*, 23.4R1*, and all subsequent releases.\n\n\n*Pending Publication"}],"source":{"defect":["1736937"],"discovery":"EXTERNAL"},"title":"Junos OS: EX Series: A PHP vulnerability in J-Web allows an unauthenticated attacker to control important environment variables","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Disable J-Web, or limit access to only trusted hosts.\n\n<br>"}],"value":"Disable J-Web, or limit access to only trusted hosts."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:01:09.911Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","mitigation","x_transferred"],"url":"https://supportportal.juniper.net/JSA72300"},{"url":"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-36844","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2023-11-15T16:40:39.936747Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2023-11-13","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36844"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36844","tags":["government-resource"]}],"timeline":[{"time":"2023-11-13T00:00:00.000Z","lang":"en","value":"CVE-2023-36844 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:40.828Z"}}]}}