Skip to content

Latest commit

 

History

History
19 lines (16 loc) · 987 Bytes

README.md

File metadata and controls

19 lines (16 loc) · 987 Bytes

CVE-2023-36845 PoC Automation Script This script provides an automated Proof of Concept (PoC) for the vulnerability identified as CVE-2023-36845, which affects the J-Web component of Juniper Networks Junos OS on EX and SRX Series devices. It demonstrates the potential for remote modification of the PHPRC variable in the PHP environment, which can lead to code injection and execution. ** Prerequisites** Python 3.x Required : requests==2.26.0

** Installation**

  1. Clone the repository: git clone https://github.com/cyberh3als/CVE-2023-36845-POC.git
  2. cd [YOUR_DIRECTORY_NAME]
  3. Install the required libraries: pip install -r requirements.txt
  4. Usage: python3 CVE-2023-36845-POC.py

Warning Use this script responsibly. Ensure you have explicit permission to test against any target systems. Unauthorized testing can lead to legal consequences.

Contributing Pull requests are welcome. For major changes, please open an issue first to discuss what you'd like to change.