CVE-2020-5246

Traccar GPS Tracking System before version 4.9 has a LDAP injection vulnerability. It occurs when user input is being used in LDAP search filter. By providing specially crafted input, an attacker can modify the logic of the LDAP query and get admin privileges. The issue only impacts instances with LDAP configuration and where users can craft their own names. This has been patched in version 4.9.
Configurations

Configuration 1 (hide)

cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:33

Type Values Removed Values Added
CVSS v2 : 4.0
v3 : 6.5
v2 : 4.0
v3 : 7.7
References () https://github.com/traccar/traccar/commit/e4f6e74e57ab743b65d49ae00f6624a20ca0291e - Patch, Third Party Advisory () https://github.com/traccar/traccar/commit/e4f6e74e57ab743b65d49ae00f6624a20ca0291e - Patch, Third Party Advisory
References () https://github.com/traccar/traccar/security/advisories/GHSA-v955-7g22-2p49 - Third Party Advisory () https://github.com/traccar/traccar/security/advisories/GHSA-v955-7g22-2p49 - Third Party Advisory

Information

Published : 2020-07-14 21:15

Updated : 2024-11-21 05:33


NVD link : CVE-2020-5246

Mitre link : CVE-2020-5246

CVE.ORG link : CVE-2020-5246


JSON object : View

Products Affected

traccar

  • traccar
CWE
CWE-90

Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')

CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')