Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Very High
CVE-2024-2054
Disclosure Date: March 21, 2024 (last updated March 21, 2024)
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
4
Attacker Value
Unknown
CVE-2024-2053
Disclosure Date: March 21, 2024 (last updated February 14, 2025)
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
0
Attacker Value
Unknown
CVE-2024-2056
Disclosure Date: March 05, 2024 (last updated March 06, 2024)
Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.
0
Attacker Value
Unknown
CVE-2024-2055
Disclosure Date: March 05, 2024 (last updated March 06, 2024)
The "Rich Filemanager" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user.
0