Traccar GPS Tracking System before version 4.9 has a LDAP injection vulnerability. It occurs when user input is being used in LDAP search filter. By providing specially crafted input, an attacker can modify the logic of the LDAP query and get admin privileges. The issue only impacts instances with LDAP configuration and where users can craft their own names. This has been patched in version 4.9.
References
Link | Resource |
---|---|
https://github.com/traccar/traccar/commit/e4f6e74e57ab743b65d49ae00f6624a20ca0291e | Patch Third Party Advisory |
https://github.com/traccar/traccar/security/advisories/GHSA-v955-7g22-2p49 | Third Party Advisory |
https://github.com/traccar/traccar/commit/e4f6e74e57ab743b65d49ae00f6624a20ca0291e | Patch Third Party Advisory |
https://github.com/traccar/traccar/security/advisories/GHSA-v955-7g22-2p49 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:33
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 7.7 |
References | () https://github.com/traccar/traccar/commit/e4f6e74e57ab743b65d49ae00f6624a20ca0291e - Patch, Third Party Advisory | |
References | () https://github.com/traccar/traccar/security/advisories/GHSA-v955-7g22-2p49 - Third Party Advisory |
Information
Published : 2020-07-14 21:15
Updated : 2024-11-21 05:33
NVD link : CVE-2020-5246
Mitre link : CVE-2020-5246
CVE.ORG link : CVE-2020-5246
JSON object : View
Products Affected
traccar
- traccar