Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13159 PoC — ArticaTech Artica Proxy 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:ArticaTech Artica Proxy 操作系统命令注入漏洞 (CVE-2020-13159)
Description:ArticaTech Artica Proxy是法国ArticaTech公司的一款开源的Artica代理解决方案。 ArticaTech Artica Proxy 4.30.000000 Community Edition之前版本中存在操作系统命令注入漏洞。该漏洞源于外部输入数据构造操作系统可执行命令过程中,网络系统或产品未正确过滤其中的特殊字符、命令等。攻击者可利用该漏洞执行非法操作系统命令。
Description
CVE-2020-13159 - Artica Proxy before 4.30.000000 Community Edition allows OS command injection.
Readme
# CVE-2020-13159 - Artica Proxy before 4.30.000000 Community Edition allows Multiple OS command injection.

**Product Description:** Artica Tech offers a powerful but simple-to-use solution, usually the preserve of Large and Multinational companies. With a starting price of just 99€ and more than 62 000 active servers, Artica Proxy has been developed over the past 10 years as an Open Source Project to help SMEs and public bodies protect both their organizations and employees from Internet danger at a low cost.

**Description:** Artica Proxy before 4.30.000000 Community Edition allows OS command injection via the *Netbios name, Server domain name, dhclient_mac, Hostname, or Alias * field. 

**Vulnerability Type Other:** OS Command Injection

**Severity Rating:** High

**Vendor of Product:** Artica

**Affected Product Code Base:** Artica-Proxy - v4.28.030418 Community Edition

**Affected Component:** In Artica Proxy Web interface URIs, application ask user to enter with the value, a malicious user can perform OS command injection attack via below vulnerable parameters. *Netbios name, Server domain name, dhclient_mac, Hostname & Alias*

**Attack Type:** Remote

**Impact Information Disclosure:** True

**CVE Impact Other:** An attacker can add additional commands or inject operating system commands. This means that during a command injection attack, an attacker can easily take complete control of the host operating system of the web.

**Attack Vectors:** To exploit this type of vulnerability on the Artica-Proxy product, an attacker has to inject OS command at vulnerable parameters of an application.

**Has vendor confirmed or acknowledged the vulnerability?:**  True

**Reference:** https://sourceforge.net/projects/artica-squid/files/

**Exploit Author: Amar Kaldate**

**Contact:** https://www.linkedin.com/in/amar-kaldate-6aa744a9/


File Snapshot

[4.0K] /data/pocs/f43075eb15ab608d3339c00e3fbacf0d2e4270ee └── [1.8K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.