CVE-2024-2054
Artica Proxy Unauthenticated PHP Deserialization Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
La aplicación web administrativa Artica-Proxy deserializará objetos PHP arbitrarios proporcionados por usuarios no autenticados y posteriormente permitirá la ejecución de código como usuario "www-data".
A command injection vulnerability in Artica Proxy appliance versions 4.50 and 4.40 allows remote attackers to run arbitrary commands via an unauthenticated HTTP request. The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the www-data user.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-03-01 CVE Reserved
- 2024-03-05 CVE Published
- 2024-03-26 First Exploit
- 2024-07-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (4)
URL | Date | SRC |
---|---|---|
https://github.com/Madan301/CVE-2024-2054 | 2024-03-26 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Artica Tech Search vendor "Artica Tech" | Artica Proxy Search vendor "Artica Tech" for product "Artica Proxy" | 4.50 Search vendor "Artica Tech" for product "Artica Proxy" and version "4.50" | en |
Affected
|