SB2024043002 - Multiple vulnerabilities in Artica Proxy



SB2024043002 - Multiple vulnerabilities in Artica Proxy

Published: April 30, 2024

Security Bulletin ID SB2024043002
Severity
High
Patch available
NO
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Authentication bypass using an alternate path or channel (CVE-ID: CVE-2024-2056)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the authentication bypass using an alternate path or channel. A remote attacker can view the contents of any file.


2) Path traversal (CVE-ID: CVE-2024-2053)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to the local file inclusion issue. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.


3) Deserialization of Untrusted Data (CVE-ID: CVE-2024-2054)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data within the administrative web application. A remote user can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Authentication bypass using an alternate path or channel (CVE-ID: CVE-2024-2055)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the authentication bypass using an alternate path or channel wirhin the "Rich Filemanager" feature. A remote attacker can gain complete access to the file system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.