Articatech

Artica Proxy

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 37.93%
  • Veröffentlicht 21.03.2024 02:52:27
  • Zuletzt bearbeitet 12.01.2026 15:48:46

The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Prox...

Exploit
  • EPSS 85.08%
  • Veröffentlicht 21.03.2024 02:52:27
  • Zuletzt bearbeitet 12.01.2026 15:49:00

The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 05.03.2024 20:16:01
  • Zuletzt bearbeitet 12.01.2026 15:45:51

The "Rich Filemanager" feature of Artica Proxy provides a web-based interface for file management capabilities. When the feature is enabled, it does not require authentication by default, and runs as the root user.

Exploit
  • EPSS 4.92%
  • Veröffentlicht 05.03.2024 20:16:01
  • Zuletzt bearbeitet 12.01.2026 15:44:02

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening...

Exploit
  • EPSS 4.37%
  • Veröffentlicht 24.08.2022 13:15:08
  • Zuletzt bearbeitet 21.11.2024 07:14:31

An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerability via the password parameter in /fw.login.php.

  • EPSS 6.74%
  • Veröffentlicht 05.05.2022 11:15:07
  • Zuletzt bearbeitet 22.01.2026 14:59:28

A OS Command Injection vulnerability was discovered in Artica Proxy 4.30.000000. Attackers can execute OS commands in cyrus.events.php with GET param logs and POST param rp.

Exploit
  • EPSS 9.1%
  • Veröffentlicht 20.07.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:42

An issue was discovered in Artica Proxy CE before 4.28.030.418. SQL Injection exists via the Netmask, Hostname, and Alias fields.

Exploit
  • EPSS 11.8%
  • Veröffentlicht 20.07.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:42

An issue was discovered in Artica Proxy CE before 4.28.030.418. Reflected XSS exists via these search fields: real time request, System Events, Proxy Events, Proxy Objects, and Firewall objects.

Exploit
  • EPSS 25.84%
  • Veröffentlicht 15.07.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:42

An issue was discovered in Artica Proxy before 4.30.000000. Stored XSS exists via the Server Domain Name, Your Email Address, Group Name, MYSQL Server, Database, MYSQL Username, Group Name, and Task Description fields.

Exploit
  • EPSS 92.09%
  • Veröffentlicht 22.06.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:46

Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter.