Vulnerability Description
Artica Proxy 3.06.200056 allows remote attackers to execute arbitrary commands as root by reading the ressources/settings.inc ldap_admin and ldap_password fields, using these credentials at logon.php, and then entering the commands in the admin.index.php command-line field.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Articatech | Artica Proxy | 3.06.200056 |
Related Weaknesses (CWE)
References
- https://code610.blogspot.com/2019/01/rce-in-artica.htmlExploitThird Party Advisory
- https://github.com/c610/tmp/blob/master/aRtiCE.pyExploitThird Party Advisory
- https://code610.blogspot.com/2019/01/rce-in-artica.htmlExploitThird Party Advisory
- https://github.com/c610/tmp/blob/master/aRtiCE.pyExploitThird Party Advisory
FAQ
What is CVE-2019-7300?
CVE-2019-7300 is a vulnerability with a CVSS score of 7.2 (HIGH). Artica Proxy 3.06.200056 allows remote attackers to execute arbitrary commands as root by reading the ressources/settings.inc ldap_admin and ldap_password fields, using these credentials at logon.php,...
How severe is CVE-2019-7300?
CVE-2019-7300 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7300?
Check the references section above for vendor advisories and patch information. Affected products include: Articatech Artica Proxy.