Skip to content

Services that are running and bound to the loopback...

Unreviewed Published Mar 5, 2024 to the GitHub Advisory Database • Updated Mar 5, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.

References

Published by the National Vulnerability Database Mar 5, 2024
Published to the GitHub Advisory Database Mar 5, 2024
Last updated Mar 5, 2024

Severity

Unknown

EPSS score

0.045%
(17th percentile)

Weaknesses

CVE ID

CVE-2024-2056

GHSA ID

GHSA-8jfc-89mc-pjwm

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.