Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix `device.` under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue.
References
Configurations
No configuration.
History
21 Nov 2024, 08:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/traccar/traccar/commit/b099b298f90074c825ba68ce73532933c7b9d901 - | |
References | () https://github.com/traccar/traccar/security/advisories/GHSA-vhrw-72f6-gwp5 - | |
Summary |
|
10 Apr 2024, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 15:16
Updated : 2024-11-21 08:59
NVD link : CVE-2024-24809
Mitre link : CVE-2024-24809
CVE.ORG link : CVE-2024-24809
JSON object : View
Products Affected
No product.