PoC-in-GitHub/2023/CVE-2023-36845.json
2025-01-14 15:31:53 +09:00

582 lines
No EOL
21 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 692368063,
"name": "cve-2023-36845-scanner",
"full_name": "vulncheck-oss\/cve-2023-36845-scanner",
"owner": {
"login": "vulncheck-oss",
"id": 134310220,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134310220?v=4",
"html_url": "https:\/\/github.com\/vulncheck-oss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vulncheck-oss\/cve-2023-36845-scanner",
"description": "A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845",
"fork": false,
"created_at": "2023-09-16T09:11:21Z",
"updated_at": "2025-01-09T03:49:30Z",
"pushed_at": "2025-01-02T18:32:11Z",
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-36845",
"go-exploit"
],
"visibility": "public",
"forks": 7,
"watchers": 61,
"score": 0,
"subscribers_count": 2
},
{
"id": 696932971,
"name": "CVE-2023-36845",
"full_name": "kljunowsky\/CVE-2023-36845",
"owner": {
"login": "kljunowsky",
"id": 104329412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4",
"html_url": "https:\/\/github.com\/kljunowsky",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kljunowsky\/CVE-2023-36845",
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
"fork": false,
"created_at": "2023-09-26T17:56:55Z",
"updated_at": "2025-01-04T22:51:15Z",
"pushed_at": "2023-12-29T14:56:44Z",
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bug-bounty-hunting",
"bugbounty",
"bugbountytips",
"bugbountytricks",
"cve-2023-36845",
"cybersecurity",
"hacking",
"juniper",
"juniper-firewall",
"juniper-networks",
"juniper-srx",
"poc",
"proof-of-concept",
"rce",
"remote-code-execution",
"remote-command-execution",
"security",
"web-application-security"
],
"visibility": "public",
"forks": 13,
"watchers": 51,
"score": 0,
"subscribers_count": 2
},
{
"id": 697223244,
"name": "CVE-2023-36845",
"full_name": "toanln-cov\/CVE-2023-36845",
"owner": {
"login": "toanln-cov",
"id": 85386928,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85386928?v=4",
"html_url": "https:\/\/github.com\/toanln-cov",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/toanln-cov\/CVE-2023-36845",
"description": "PoC CVE-2023-36845 on Juniper Device",
"fork": false,
"created_at": "2023-09-27T09:50:56Z",
"updated_at": "2023-09-27T09:50:56Z",
"pushed_at": "2023-09-27T09:59:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 697535572,
"name": "CVE-2023-36845",
"full_name": "halencarjunior\/CVE-2023-36845",
"owner": {
"login": "halencarjunior",
"id": 403088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4",
"html_url": "https:\/\/github.com\/halencarjunior",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/halencarjunior\/CVE-2023-36845",
"description": null,
"fork": false,
"created_at": "2023-09-27T23:56:07Z",
"updated_at": "2023-09-28T19:28:33Z",
"pushed_at": "2023-09-27T23:57:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 698046011,
"name": "CVE-2023-36845",
"full_name": "zaenhaxor\/CVE-2023-36845",
"owner": {
"login": "zaenhaxor",
"id": 83585135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83585135?v=4",
"html_url": "https:\/\/github.com\/zaenhaxor",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zaenhaxor\/CVE-2023-36845",
"description": "CVE-2023-36845 - Juniper Firewall Remote code execution (RCE)",
"fork": false,
"created_at": "2023-09-29T03:11:37Z",
"updated_at": "2024-02-08T18:45:52Z",
"pushed_at": "2023-10-07T03:25:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 698815248,
"name": "CVE-2023-36845",
"full_name": "simrotion13\/CVE-2023-36845",
"owner": {
"login": "simrotion13",
"id": 29673625,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29673625?v=4",
"html_url": "https:\/\/github.com\/simrotion13",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/simrotion13\/CVE-2023-36845",
"description": null,
"fork": false,
"created_at": "2023-10-01T03:41:40Z",
"updated_at": "2023-10-18T09:56:27Z",
"pushed_at": "2023-10-01T03:43:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 699198959,
"name": "CVE-2023-36845-POC",
"full_name": "cyberh3als\/CVE-2023-36845-POC",
"owner": {
"login": "cyberh3als",
"id": 132987956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132987956?v=4",
"html_url": "https:\/\/github.com\/cyberh3als",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cyberh3als\/CVE-2023-36845-POC",
"description": "CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution.",
"fork": false,
"created_at": "2023-10-02T06:28:07Z",
"updated_at": "2024-02-28T20:08:22Z",
"pushed_at": "2023-10-02T10:31:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 719033136,
"name": "ansible-cve-2023-36845",
"full_name": "3yujw7njai\/ansible-cve-2023-36845",
"owner": {
"login": "3yujw7njai",
"id": 7390055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
"html_url": "https:\/\/github.com\/3yujw7njai",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/3yujw7njai\/ansible-cve-2023-36845",
"description": "Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)",
"fork": false,
"created_at": "2023-11-15T10:02:22Z",
"updated_at": "2024-02-22T12:58:22Z",
"pushed_at": "2023-11-14T16:59:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 749976311,
"name": "Automation-for-Juniper-cve-2023-36845",
"full_name": "Asbawy\/Automation-for-Juniper-cve-2023-36845",
"owner": {
"login": "Asbawy",
"id": 24960024,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24960024?v=4",
"html_url": "https:\/\/github.com\/Asbawy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Asbawy\/Automation-for-Juniper-cve-2023-36845",
"description": "Simple Automation script for juniper cve-2023-36845",
"fork": false,
"created_at": "2024-01-29T18:53:22Z",
"updated_at": "2024-08-13T17:45:05Z",
"pushed_at": "2024-01-30T19:27:34Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 750216098,
"name": "Juniper-CVE-2023-36845-Mass-Hunting",
"full_name": "jahithoque\/Juniper-CVE-2023-36845-Mass-Hunting",
"owner": {
"login": "jahithoque",
"id": 61009126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61009126?v=4",
"html_url": "https:\/\/github.com\/jahithoque",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jahithoque\/Juniper-CVE-2023-36845-Mass-Hunting",
"description": "Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.",
"fork": false,
"created_at": "2024-01-30T08:00:23Z",
"updated_at": "2024-02-12T07:51:29Z",
"pushed_at": "2024-01-30T08:23:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 751165844,
"name": "Juniper-Bug-Automation-CVE-2023-36845",
"full_name": "cyb3rzest\/Juniper-Bug-Automation-CVE-2023-36845",
"owner": {
"login": "cyb3rzest",
"id": 29830064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29830064?v=4",
"html_url": "https:\/\/github.com\/cyb3rzest",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cyb3rzest\/Juniper-Bug-Automation-CVE-2023-36845",
"description": null,
"fork": false,
"created_at": "2024-02-01T03:54:18Z",
"updated_at": "2024-02-01T04:12:54Z",
"pushed_at": "2024-02-01T04:12:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 752138002,
"name": "Juniper-exploit-CVE-2023-36845",
"full_name": "CharonDefalt\/Juniper-exploit-CVE-2023-36845",
"owner": {
"login": "CharonDefalt",
"id": 103410775,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103410775?v=4",
"html_url": "https:\/\/github.com\/CharonDefalt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CharonDefalt\/Juniper-exploit-CVE-2023-36845",
"description": null,
"fork": false,
"created_at": "2024-02-03T06:09:30Z",
"updated_at": "2024-07-06T12:16:37Z",
"pushed_at": "2024-02-03T06:10:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 756915860,
"name": "CVE-2023-36845-6-",
"full_name": "iveresk\/CVE-2023-36845-6-",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iveresk\/CVE-2023-36845-6-",
"description": "CVE-2023-36845 и CVE-2023-36846 Juniper Junos OS J-Web RCE",
"fork": false,
"created_at": "2024-02-13T14:59:59Z",
"updated_at": "2024-02-13T15:11:24Z",
"pushed_at": "2024-02-13T15:11:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 757119162,
"name": "CVE-2023-36845",
"full_name": "ak1t4\/CVE-2023-36845",
"owner": {
"login": "ak1t4",
"id": 10950567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10950567?v=4",
"html_url": "https:\/\/github.com\/ak1t4",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ak1t4\/CVE-2023-36845",
"description": "CVES ",
"fork": false,
"created_at": "2024-02-13T20:59:34Z",
"updated_at": "2024-05-26T20:16:50Z",
"pushed_at": "2024-02-13T21:47:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 757410546,
"name": "CVE-2023-36845-Juniper-Vulnerability",
"full_name": "0xNehru\/CVE-2023-36845-Juniper-Vulnerability",
"owner": {
"login": "0xNehru",
"id": 160024662,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160024662?v=4",
"html_url": "https:\/\/github.com\/0xNehru",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xNehru\/CVE-2023-36845-Juniper-Vulnerability",
"description": "This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection.",
"fork": false,
"created_at": "2024-02-14T12:47:21Z",
"updated_at": "2024-02-14T14:51:34Z",
"pushed_at": "2024-02-14T14:07:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 758837378,
"name": "CVE-2023-36845",
"full_name": "ifconfig-me\/CVE-2023-36845",
"owner": {
"login": "ifconfig-me",
"id": 25315805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
"html_url": "https:\/\/github.com\/ifconfig-me",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2023-36845",
"description": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. ",
"fork": false,
"created_at": "2024-02-17T08:15:30Z",
"updated_at": "2024-02-17T08:16:33Z",
"pushed_at": "2024-04-09T20:44:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 759435815,
"name": "CVE-2023-36845",
"full_name": "e11i0t4lders0n\/CVE-2023-36845",
"owner": {
"login": "e11i0t4lders0n",
"id": 76389721,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76389721?v=4",
"html_url": "https:\/\/github.com\/e11i0t4lders0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/e11i0t4lders0n\/CVE-2023-36845",
"description": "CVE-2023-36845 Unauthenticated Juniper Remote Code Execution Vulnerability Scanner",
"fork": false,
"created_at": "2024-02-18T15:37:58Z",
"updated_at": "2025-01-14T05:59:12Z",
"pushed_at": "2024-02-18T18:44:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 795971673,
"name": "Automation-for-Juniper-cve-2023-36845",
"full_name": "Vignesh2712\/Automation-for-Juniper-cve-2023-36845",
"owner": {
"login": "Vignesh2712",
"id": 127646022,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127646022?v=4",
"html_url": "https:\/\/github.com\/Vignesh2712",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Vignesh2712\/Automation-for-Juniper-cve-2023-36845",
"description": null,
"fork": false,
"created_at": "2024-05-04T14:51:45Z",
"updated_at": "2024-05-04T14:51:45Z",
"pushed_at": "2024-05-04T14:51:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]