CVE-2024-2053

HIGH EXPLOITED NUCLEI

Articatech Artica Proxy - Path Traversal

Title source: rule
STIX 2.1

Description

The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.

Exploits (1)

nomisec WORKING POC
by b-L-x · remote
https://github.com/b-L-x/CVE-2024-2053

Nuclei Templates (1)

Artica Proxy - Unauthenticated LFI
HIGHVERIFIEDby pussycat0x
Shodan: http.html:"artica"
FOFA: body="artica"

Scores

CVSS v3 7.5
EPSS 0.4086
EPSS Percentile 97.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

VulnCheck KEV 2026-02-02
CWE
CWE-23
Status published
Products (2)
articatech/artica_proxy 4.40.000000
articatech/artica_proxy 4.50.000000
Published Mar 21, 2024
Tracked Since Feb 18, 2026