CVE Vulnerabilities

CVE-2024-2056

Authentication Bypass Using an Alternate Path or Channel

Published: Mar 05, 2024 | Modified: Mar 06, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the tailon service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkovs tailon GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.

Weakness

A product requires authentication, but the product has an alternate path or channel that does not require authentication.

Potential Mitigations

References