### [CVE-2018-0001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0001) ![](https://img.shields.io/static/v1?label=Product&message=Junos%20OS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=12.1X4612.1X46-D67%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen) ### Description A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70. ### POC #### Reference No PoCs from references. #### Github - https://github.com/becrevex/Kampai - https://github.com/fabric8-analytics/fabric8-analytics-data-model - https://github.com/hashauthority/wsusscn2cli