{ "id": "CVE-2024-2054", "sourceIdentifier": "cve@takeonme.org", "published": "2024-03-21T02:52:27.320", "lastModified": "2024-03-21T12:58:51.093", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the \"www-data\" user." }, { "lang": "es", "value": "La aplicaci\u00f3n web administrativa Artica-Proxy deserializar\u00e1 objetos PHP arbitrarios proporcionados por usuarios no autenticados y posteriormente permitir\u00e1 la ejecuci\u00f3n de c\u00f3digo como usuario \"www-data\"." } ], "metrics": {}, "weaknesses": [ { "source": "cve@takeonme.org", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-502" } ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/12", "source": "cve@takeonme.org" }, { "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt", "source": "cve@takeonme.org" } ] }