-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Artica Proxy unauthenticated RCE [CVE-2024-2054] #18967
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
|
bwatters-r7
reviewed
Mar 19, 2024
modules/exploits/linux/http/artica_proxy_unauth_rce_cve_2024_2054.rb
Outdated
Show resolved
Hide resolved
documentation/modules/exploit/linux/http/artica_proxy_unauth_rce_cve_2024_2054.md
Outdated
Show resolved
Hide resolved
|
bwatters-r7
closed this pull request by merging all changes
into
rapid7:master
in
Mar 25, 2024
e775c7c
Release NotesThe PR adds a module targeting CVE-2024-2054, a command injection vulnerability in Artica Proxy appliance version 4.50 and 4.40. The exploit allows remote unauthenticated attackers to run arbitrary commands as the |
bwatters-r7
added
rn-modules
release notes for new or majorly enhanced modules
module
labels
Mar 26, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
A Command Injection vulnerability in Artica Proxy appliance version
4.50
and4.40
allows remote attackers to run arbitrary commands via unauthenticated HTTP request.The Artica Proxy administrative web application will de-serialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the
www-data
user.This module has been tested with:
Installation steps to install Artica Proxy appliance
ssh
on port22
or via thewebui
viahttps://your_articaproxy_ip:9000
.You are now ready to test the module.
Verification Steps
msfconsole
use exploit/linux/http//artica_proxy_unauth_rce_cve_2024_2054
set rhosts <ip-target>
set rport <port>
set webshell cuckoo
set target <0=PHP, 1=Unix Command, 2=Linux Dropper>
exploit
reverse shell
orMeterpreter
session depending on thepayload
andtarget
settingsScenarios
Target 0 - PHP native
php/meterpreter/reverse_tcp
sessionTarget 1 - Unix Command
cmd/unix/reverse_bash
sessionTarget 2 - Linux Dropper
linux/x64/meterpreter/reverse_tcp
sessionLimitations
No limitations.