exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Artica Proxy VMWare Appliance 4.30.000000 SP273 Path Traversal

Artica Proxy VMWare Appliance 4.30.000000 SP273 Path Traversal
Posted Sep 3, 2021
Authored by Heiko Feldhusen

Artica Proxy VMWare Appliance versions 4.30.000000 SP273 and below suffer from a path traversal vulnerability.

tags | exploit
advisories | CVE-2021-40680
SHA-256 | 7dcc4675050e13cb48b4f8260cdd2bf6677d8c485b8a55b1e18dda85bcab8b6f

Artica Proxy VMWare Appliance 4.30.000000 SP273 Path Traversal

Change Mirror Download

Advisory ID: RCS20210707-0
Product: Artica Proxy VMWare Appliance
Vendor/Manufacturer: ArticaTech (https://www.articatech.com)
Affected Version(s): 4.30.000000 <=[SP273]
Tested Version(s): 4.30.000000 [SP273]
Vulnerability Type: Relative path traversal [CWE-23], Improper Limitation of a Pathname to a restricted Directory [CWE-22], [CWE 35], [CWE 36], [CAPEC-126]
CVSS v3.1 Risk Level: High
CVSS v3.1 Risk Score: 8.1
CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS v3.0 Risk Level: High
CVSS v3.0 Risk Score: 8.1
CVSS v3.0 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS v2.0 Risk Level: High
CVSS v2.0 Base Score: 7.8
CVSS v2.0 Temporal Score: 6.1
CVSS v2.0 Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N
CVSS v2.0 Temporal Vector: CVSS2#E:POC/RL:OF/RC:C
Solution Status: Fixed in Version 4.30.000000 [SP273]
Manufacturer Notification: 5th July 2021
Solution Date: 9th August 2021
Public Disclosure: 26.08.2021
CVE Reference:
Author of Advisory: Heiko Feldhusen, Rheinmetall Cyber Solutions GmbH

####----####----####----####----####----####----####----####----####----####----

Vendor-Description:

Artica Tech is a new French Software Publisher, an independant company, established in 2012.
It is based near Paris in France.
Artica project began in 2004 and stemmed from ideas about how to improve the Open Source security
solutions available at the time, which were difficult and often expensive to implement and maintain
Artica claim to provide a user-friendly Web interface.
Today, with around 100.000 servers installed worldwide, Artica solutions are as relevant
to small and medium-sized entreprises as they are to the largest of firms.

Source:
https://www.articatech.com/about-artica.php


####----####----####----####----####----####----####----####----####----####----

Product-Description:

Artica V4 is an appliance based on Debian 10 Operating system.
Your can install it on the Hardware or Virtual Machine of your choice and get a Web Gateway
appliance within minutes.

Artica embeds technologies such as

Antivirus,
URL Filtering,
Web HTTP Proxy,
Web Caching,
Web Secure Proxy,
SSH Gateway/Proxy,
RDP Reverse Proxy,
Firewall,
SSL Inspection,
Kerberos Authentication,
Access Logging,
Bandwidth Shaping,
HTTP Compression,
WAF (Web Application Firewall),
Web traffic Load Balancing.

Artica-Proxy claim to offer a full HTTP/HTTPS/FTP/SSH/RDP/VNC proxy infrastructure.

Source:
http://articatech.net/about-proxy.php

####----####----####----####----####----####----####----####----####----####----

Vulnerability Details:

The software uses external input to construct a pathname that should be within a restricted directory,
but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.


This vulnerability allows to use the Web-filtering page to read any file on the system.


This vulnerability exists in the used cgi function, which is a build in part of the proxy.
This board has a security flaw in the CGI main.cgi that lets an attacker read arbitrary files with the privileges of the http daemon (usually root or nobody).
We were able to read the passwd, so we assume the http deamon runs with root-priviledges.


Source:
https://cwe.mitre.org/data/definitions/23.html

####----####----####----####----####----####----####----####----####----####----

Proof of Concept (PoC):
http://yourproxynamehere/cgi-bin/main.cgi? filename=/../../../../../../../../etc/passwd


####----####----####----####----####----####----####----####----####----####----

Solution:
Fix provided from Artica Tech.
Update to Version 4.30.000000 [SP273]
####----####----####----####----####----####----####----####----####----####----

Disclosure Timeline:

2021-06-28: Vulnerability discovered
2021-07-05: Vulnerability reported to manufacturer
2021-07-07: Patch released by manufacturer
2021-08-26: Public disclosure of vulnerability

####----####----####----####----####----####----####----####----####----####----

References:

[1] Product website for Admin Columns
https://www.articatech.com/about-proxy.php



####----####----####----####----####----####----####----####----####----####----

Credits:

This vulnerability was discovered by Heiko Feldhusen.

E-Mail: heiko D:O:T feldhusen () rheinmetall-cyber D.O.T solutions

Public Key: https://keys.openpgp.org/vks/v1/by-fingerprint/2532144FBD175EAF6F9A314FC64DA4E4D3CDF74C

####----####----####----####----####----####----####----####----####----####----

Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible.

####----####----####----####----####----####----####----####----####----####----

Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

####----####----####----####----####----####----####----####----####----####----

Heiko Feldhusen
ISOC Engineer
Engineering
Rheinmetall Cyber Solutions GmbH

Rheinmetall Cyber Solutions GmbH
Mary-Somerville-Str. 14, 28359 Bremen, Germany Sitz der Gesellschaft: Bremen
Amtsgericht Bremen HRB 35995
Gesch?ftsf?hrung/Executive Board:
Moritz Pichler, Jendrik Kreisel
This email may contain confidential information. If you are not the intended addressee, or if the information provided in this email including any attachments) is evidently not destined for you, kindly inform us promptly and delete the message received in error (including any attachments) by erasing it from all your computers and other storage devices or media and destroying any hard copies thereof. Any unauthorized processing, forwarding, disclosure, distribution, divulgation, storage, printout or other use of this message or its attachment is prohibited. If your system is infected or otherwise bugged by any virus that is carried by this email, we disclaim any liability whatsoever for the ensuing loss or damage unless caused by our intention or gross negligence.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close