Juniper Junos OS Pre-Auth RCE (JSA72300)

critical Nessus Plugin ID 180190

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The version of Junos OS installed on the remote host is affected by multiple vulnerabilities as referenced in the JSA72300 advisory.

- A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX and SRX Series allows an unauthenticated, network-based attacker to control certain, important environments variables.
Utilizing a crafted request an attacker is able to modify certain PHP environments variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. (CVE-2023-36844, CVE-2023-36845)

- A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX and SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.
With a specific request that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. (CVE-2023-36846, CVE-2023-36847)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Apply the relevant Junos software release referenced in Juniper advisory JSA72300

See Also

http://www.nessus.org/u?752ef07a

http://www.nessus.org/u?00a9cacd

http://www.nessus.org/u?812ee185

http://www.nessus.org/u?d0ab70e2

Plugin Details

Severity: Critical

ID: 180190

File Name: juniper_jsa72300.nasl

Version: 1.10

Type: combined

Published: 8/25/2023

Updated: 12/25/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-36845

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/JUNOS/Version, Host/Juniper/model

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/17/2023

Vulnerability Publication Date: 8/17/2023

CISA Known Exploited Vulnerability Due Dates: 11/17/2023

Exploitable With

Metasploit (Junos OS PHPRC Environment Variable Manipulation RCE)

Reference Information

CVE: CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847, CVE-2023-36851

IAVA: 2023-A-0433-S, 2023-A-0465

JSA: JSA72300