Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13158 PoC — ArticaTech Artica Proxy 路径遍历漏洞

Source
Associated Vulnerability
Title:ArticaTech Artica Proxy 路径遍历漏洞 (CVE-2020-13158)
Description:ArticaTech Artica Proxy是法国ArticaTech公司的一款开源的Artica代理解决方案。 ArticaTech Artica Proxy 4.30.000000 Community Edition之前版本中存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Description
CVE-2020-13158 - Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal 
Readme
# CVE-2020-13158 - Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal 

**Product Description:** Artica Tech offers a powerful but simple-to-use solution, usually the preserve of Large and Multinational companies. With a starting price of just 99€ and more than 62 000 active servers, Artica Proxy has been developed over the past 10 years as an Open 
Source Project to help SMEs and public bodies protect both their organizations and employees from Internet danger at a low cost.

**Description:**
Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter.

**Vulnerability Type:** Directory Traversal

**Severity Rating:** High

**Vendor of Product:** Artica

**Affected Product Code Base:** Artica-Proxy - v4.28.030418 Community Edition

**Affected Component:** For Directory Traversal attack *popup* parameter value is not sanitized/validate properly. In Artica-Proxy product some of the parameters are not sanitized/validate properly which allows an attacker to inject OS Commands.

**Attack Type:** Remote

**Impact Information Disclosure:** True

**Attack Vectors:**  To exploit this vulnerability attacker must enter pathname like
 ( https://<Web_Interface_URIs>/fw.progrss.details.php?popup=..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd )

**Has vendor confirmed or acknowledged the vulnerability?:** true

**Reference:** https://sourceforge.net/projects/artica-squid/files/

**Exploit Author: Amar Kaldate**

**Contact:** https://www.linkedin.com/in/amar-kaldate-6aa744a9/
File Snapshot

[4.0K] /data/pocs/fe1cbaeb9e1dc3762dab437c9cd9128dab5b0033 └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.