Vulnerability Description
A OS Command Injection vulnerability was discovered in Artica Proxy 4.30.000000. Attackers can execute OS commands in cyrus.events.php with GET param logs and POST param rp.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Articatech | Artica Proxy | 4.30.000000 |
Related Weaknesses (CWE)
References
- https://medium.com/%40rootless724/artica-proxy-4-30-cyrus-events-php-rce-3aa2a86
- https://medium.com/%40rootless724/artica-proxy-4-30-cyrus-events-php-rce-3aa2a86
FAQ
What is CVE-2021-41739?
CVE-2021-41739 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A OS Command Injection vulnerability was discovered in Artica Proxy 4.30.000000. Attackers can execute OS commands in cyrus.events.php with GET param logs and POST param rp.
How severe is CVE-2021-41739?
CVE-2021-41739 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-41739?
Check the references section above for vendor advisories and patch information. Affected products include: Articatech Artica Proxy.