CVE-2024-2053
HIGH EXPLOITED NUCLEIArticatech Artica Proxy - Path Traversal
Title source: ruleDescription
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
Exploits (1)
Nuclei Templates (1)
Artica Proxy - Unauthenticated LFI
HIGHVERIFIEDby pussycat0x
Shodan:
http.html:"artica"
FOFA:
body="artica"
Scores
CVSS v3
7.5
EPSS
0.4086
EPSS Percentile
97.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
VulnCheck KEV
2026-02-02
CWE
CWE-23
Status
published
Products (2)
articatech/artica_proxy
4.40.000000
articatech/artica_proxy
4.50.000000
Published
Mar 21, 2024
Tracked Since
Feb 18, 2026