КућаМалвер и претњеАртица Проки 4.50 Лоопбацк Сервице Екпосуре

Артица Проки 4.50 Лоопбацк Сервице Екпосуре

Објављено на

spot_img

Artica Proxy Loopback Services Remotely Accessible Unauthenticated vulnerability has been discovered by Jim Becher and Jaggar Henry from KoreLogic, Inc. The vulnerability affects Artica Proxy version 4.50 running on Debian 10 LTS. The CVE ID assigned to this vulnerability is CVE-2024-2056.

The vulnerability allows remote access to services bound to the loopback interface on the Artica Proxy without any authentication. In particular, the “tailon” service, which runs as the root user, is bound to the loopback interface and listens on TCP port 7050. This exposes the Artica Proxy to security risks, as documented on the official tailon security page at https://github.com/gvalkov/tailon#security. Through the tailon service, attackers can view the contents of any file on the Artica Proxy.

Technical details provided in the advisory show a list of services running on the loopback interface, including the tailon service. The script reveals the command used to access sensitive information on the Artica Proxy. Despite multiple attempts to contact the vendor, Artica has not responded to the vulnerability disclosure, leaving no official remediation available.

The disclosure timeline highlights the efforts made by KoreLogic to engage with Artica for proper communication and mitigation. From requesting a secure communication method to disclosing the vulnerability publically, KoreLogic followed a standard procedure to responsibly report the issue. However, the lack of response from Artica led to the disclosure without an official remedy from the vendor.

The Proof of Concept shared in the advisory demonstrates how an attacker can remotely access sensitive files on the Artica Proxy using a Python exploit script. By exploiting the exposed services, an attacker can potentially retrieve confidential information without any authentication, posing a significant risk to the security and integrity of the system.

KoreLogic, Inc. is a reputable company known for its expert security services provided to a wide range of clients, from Fortune 500 companies to small businesses. The team at KoreLogic conducts thorough security assessments and develops tools to improve cybersecurity practices within the industry.

The vulnerability disclosure policy of KoreLogic emphasizes the importance of responsible disclosure and collaboration between security researchers and vendors to address potential security flaws promptly. By publicizing vulnerabilities like the one found in Artica Proxy, KoreLogic aims to raise awareness and promote proactive security measures within the community.

To ensure the safety and protection of systems and data, it is essential for vendors like Artica to acknowledge and address reported vulnerabilities in a timely manner. By working together with security experts and researchers, vendors can strengthen their cybersecurity defenses and safeguard against potential threats posed by vulnerabilities like the one identified in Artica Proxy.

In conclusion, the Artica Proxy Loopback Services Remotely Accessible Unauthenticated vulnerability highlights the importance of proactive security measures and collaboration between security researchers and vendors to mitigate potential risks and enhance overall cybersecurity resilience. Vigilance and prompt action are key to addressing vulnerabilities and safeguarding systems from unauthorized access and exploitation.

Извор линк

Најновији чланци

Maximizing Threat Detection Efficiency for MSSPs and MDRs with Uncoder AI – Source: socprime.com

In the realm of cybersecurity, security service providers such as Managed Security Service Providers...

Sudanese Brothers Arrested in AnonSudan Takedown – Krebs on Security

The arrest and charging of two Sudanese brothers accused of running cybercrime business known...

Starbucks Phishing Scam Alert and China’s Use of Quantum Technology to Bypass Encryption

Starbucks Coffee Lovers Box Phishing Scam Alert Starbucks has recently been the target of a...

The vast majority of cyberattacks on GenAI are successful

In a recent study conducted by Pillar Security, an Israeli company specializing in GenAI...

Више овако

Maximizing Threat Detection Efficiency for MSSPs and MDRs with Uncoder AI – Source: socprime.com

In the realm of cybersecurity, security service providers such as Managed Security Service Providers...

Sudanese Brothers Arrested in AnonSudan Takedown – Krebs on Security

The arrest and charging of two Sudanese brothers accused of running cybercrime business known...

Starbucks Phishing Scam Alert and China’s Use of Quantum Technology to Bypass Encryption

Starbucks Coffee Lovers Box Phishing Scam Alert Starbucks has recently been the target of a...
sr_RSSerbian