The Artica Proxy administrative web application will...
High severity
Unreviewed
Published
Mar 21, 2024
to the GitHub Advisory Database
•
Updated Aug 6, 2024
Description
Published by the National Vulnerability Database
Mar 21, 2024
Published to the GitHub Advisory Database
Mar 21, 2024
Last updated
Aug 6, 2024
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
References