First published: Tue Mar 05 2024(Updated: )
The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.
Credit: cve@takeonme.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artica Proxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2054 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2024-2054, update your Artica Proxy installation to the latest version provided by the vendor.
CVE-2024-2054 facilitates remote code execution attacks through insecure deserialization of PHP objects.
CVE-2024-2054 affects users of the Artica-Proxy administrative web application if they are running vulnerable versions.
Yes, CVE-2024-2054 can be exploited by unauthenticated users, making it particularly dangerous.