CVE-2020-17505
HIGH EXPLOITED NUCLEIArtica proxy 4.30.000000 Auth Bypass service-cmds-peform Command Injection
Title source: metasploitDescription
Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
by Max0x4141 · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/artica_proxy_auth_bypass_service_cmds_peform_command_injection.rb
Nuclei Templates (1)
Artica Web Proxy 4.30 - OS Command Injection
HIGHby dwisiswant0
Scores
CVSS v3
8.8
EPSS
0.8964
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-01-22
CWE
CWE-78
Status
published
Products (1)
articatech/web_proxy
4.30.000000
Published
Aug 12, 2020
Tracked Since
Feb 18, 2026