Juniper Junos OS Pre-Auth RCE (JSA72300)

critical Nessus Plugin ID 180190

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The version of Junos OS installed on the remote host is affected by multiple vulnerabilities as referenced in the JSA72300 advisory.

- A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX and SRX Series allows an unauthenticated, network-based attacker to control certain, important environments variables.
Utilizing a crafted request an attacker is able to modify certain PHP environments variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. (CVE-2023-36844, CVE-2023-36845)

- A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX and SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.
With a specific request that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. (CVE-2023-36846, CVE-2023-36847)

Note: Nessus found J-Web enabled [set system services web-management http(s)] on this device.

Solution

Disable J-Web, or limit access to only trusted hosts.

See Also

http://www.nessus.org/u?752ef07a

http://www.nessus.org/u?00a9cacd

http://www.nessus.org/u?812ee185

http://www.nessus.org/u?d0ab70e2

Plugin Details

Severity: Critical

ID: 180190

File Name: juniper_jsa72300.nasl

Version: 1.12

Type: combined

Published: 8/25/2023

Updated: 10/11/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-36845

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/17/2023

Vulnerability Publication Date: 8/17/2023

CISA Known Exploited Vulnerability Due Dates: 11/17/2023

Exploitable With

Metasploit (Junos OS PHPRC Environment Variable Manipulation RCE)

Reference Information

CVE: CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847, CVE-2023-36851

IAVA: 2023-A-0433-S, 2023-A-0465

JSA: JSA72300