{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-36845","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2023-06-27T16:17:25.277Z","datePublished":"2023-08-17T19:17:57.183Z","dateUpdated":"2025-10-21T23:05:40.639Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["EX Series","SRX Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S9","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.1*","status":"affected","version":"21.1","versionType":"semver"},{"lessThan":"21.2R3-S7","status":"affected","version":"21.2","versionType":"semver"},{"lessThan":"21.3R3-S5","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R3-S5","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.1R3-S4","status":"affected","version":"22.1","versionType":"semver"},{"lessThan":"22.2R3-S2","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R2-S2, 22.3R3-S1","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"22.4R2-S1, 22.4R3","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R1-S1, 23.2R2","status":"affected","version":"23,2","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following minimal configuration is necessary:</p><code>&nbsp; [system services web-management http]</code><p>or</p><code>&nbsp; [system services web-management https]</code><br>"}],"value":"The following minimal configuration is necessary:\n\n  [system services web-management http]or\n\n  [system services web-management https]"}],"credits":[{"lang":"en","type":"finder","value":"LYS, working with DEVCORE Internship Program"}],"datePublic":"2023-08-17T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\n<span style=\"background-color: rgb(255, 255, 255);\">and SRX Series </span>\n\nallows an unauthenticated, network-based attacker to remotely execute code.<br><br>Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code<span style=\"background-color: rgb(255, 255, 255);\">.</span>\n\n<br><p>This issue affects Juniper Networks Junos OS on <span style=\"background-color: rgb(255, 255, 255);\">EX Series</span>\n\n\n<span style=\"background-color: rgb(255, 255, 255);\">and </span>\n\n\nSRX Series:</p><p></p><ul><li>All versions prior to \n\n<span style=\"background-color: rgb(255, 255, 255);\">20.4R3-S9;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">21.1 versions 21.1R1 and later;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">21.2 versions prior to&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">21.2R3-S7;</span></span></li><li><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">21.3 versions prior to&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">21.3R3-S5;</span></span></span></li><li>21.4 versions prior to 21.4R3-S5;</li><li>22.1 versions \n\nprior to \n\n22.1R3-S4;</li><li>22.2 versions \n\nprior to \n\n22.2R3-S2;</li><li>22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;</li><li>22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;</li><li>23.2 versions prior to 23.2R1-S1, 23.2R2.</li></ul><p></p>"}],"value":"A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\nand SRX Series \n\nallows an unauthenticated, network-based attacker to remotely execute code.\n\nUsing a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code.\n\n\nThis issue affects Juniper Networks Junos OS on EX Series\n\n\nand \n\n\nSRX Series:\n\n\n\n  *  All versions prior to \n\n20.4R3-S9;\n  *  21.1 versions 21.1R1 and later;\n  *  21.2 versions prior to 21.2R3-S7;\n  *  21.3 versions prior to 21.3R3-S5;\n  *  21.4 versions prior to 21.4R3-S5;\n  *  22.1 versions \n\nprior to \n\n22.1R3-S4;\n  *  22.2 versions \n\nprior to \n\n22.2R3-S2;\n  *  22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;\n  *  22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;\n  *  23.2 versions prior to 23.2R1-S1, 23.2R2."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-473","description":"CWE-473 PHP External Variable Modification","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2024-02-02T17:06:19.472Z"},"references":[{"tags":["vendor-advisory","mitigation"],"url":"https://supportportal.juniper.net/JSA72300"},{"url":"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html"},{"url":"http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: \n\n<span style=\"background-color: rgb(255, 255, 255);\">20.4R3-S9*,&nbsp;</span>21.2R3-S7*,&nbsp;21.3R3-S5,&nbsp;21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1*, 22.4R2-S1, 22.4R3*, 23.2R1-S1, 23.2R2*,&nbsp;23.4R1*<span style=\"background-color: var(--wht);\">, and all subsequent releases.</span><span style=\"background-color: rgb(255, 255, 255);\"><br></span>\n\n*Pending Publication\n\n\n\n<br>"}],"value":"The following software releases have been updated to resolve this specific issue: \n\n20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1*, 22.4R2-S1, 22.4R3*, 23.2R1-S1, 23.2R2*, 23.4R1*, and all subsequent releases.\n\n\n*Pending Publication"}],"source":{"defect":["1736942"],"discovery":"EXTERNAL"},"title":"Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Disable J-Web, or limit access to only trusted hosts.<br>"}],"value":"Disable J-Web, or limit access to only trusted hosts."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:01:09.559Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","mitigation","x_transferred"],"url":"https://supportportal.juniper.net/JSA72300"},{"url":"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-36845","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2023-11-15T16:40:40.516848Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2023-11-13","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36845"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36845","tags":["government-resource"]}],"timeline":[{"time":"2023-11-13T00:00:00.000Z","lang":"en","value":"CVE-2023-36845 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:40.639Z"}}]}}