Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-50729
HistoryJan 15, 2024 - 3:57 p.m.

CVE-2023-50729 An unrestricted file upload vulnerability in traccar leads to RCE

2024-01-1515:57:27
CWE-434
GitHub_M
www.cve.org
traccar
unrestricted file upload
remote code execution
version 5.11

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.0%

Traccar is an open source GPS tracking system. Prior to 5.11, Traccar is affected by an unrestricted file upload vulnerability in File feature allows attackers to execute arbitrary code on the server. This vulnerability is more prevalent because Traccar is recommended to run web servers as root user. It is also more dangerous because it can write or overwrite files in arbitrary locations. Version 5.11 was published to fix this vulnerability.

CNA Affected

[
  {
    "vendor": "traccar",
    "product": "traccar",
    "versions": [
      {
        "version": "< 5.11",
        "status": "affected"
      }
    ]
  }
]

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.0%

Related for CVELIST:CVE-2023-50729