Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.
References
| Link | Resource |
|---|---|
| http://seclists.org/fulldisclosure/2024/Mar/14 | Exploit Mailing List Third Party Advisory |
| https://github.com/gvalkov/tailon#security | Not Applicable |
| https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt | Exploit Third Party Advisory |
| http://seclists.org/fulldisclosure/2024/Mar/14 | Exploit Mailing List Third Party Advisory |
| https://github.com/gvalkov/tailon#security | Not Applicable |
| https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt | Exploit Third Party Advisory |
Configurations
History
12 Jan 2026, 15:44
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Articatech
Articatech artica Proxy |
|
| CPE | cpe:2.3:a:articatech:artica_proxy:4.50.000000:-:*:*:*:*:*:* | |
| References | () http://seclists.org/fulldisclosure/2024/Mar/14 - Exploit, Mailing List, Third Party Advisory | |
| References | () https://github.com/gvalkov/tailon#security - Not Applicable | |
| References | () https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt - Exploit, Third Party Advisory |
21 Nov 2024, 09:08
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://seclists.org/fulldisclosure/2024/Mar/14 - | |
| References | () https://github.com/gvalkov/tailon#security - | |
| References | () https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt - |
23 Aug 2024, 21:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
05 Mar 2024, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-03-05 20:16
Updated : 2026-01-12 15:44
NVD link : CVE-2024-2056
Mitre link : CVE-2024-2056
CVE.ORG link : CVE-2024-2056
JSON object : View
Products Affected
articatech
- artica_proxy
