Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-24809
HistoryApr 10, 2024 - 2:48 p.m.

CVE-2024-24809 Traccar vulnerable to Path Traversal: 'dir/../../filename' and Unrestricted Upload of File with Dangerous Type

2024-04-1014:48:13
CWE-434
CWE-27
GitHub_M
www.cve.org
6
traccar
gps tracking
path traversal
unrestricted upload
vulnerability
file type
attack
version 6.0

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

22.6%

Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix device. under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue.

CNA Affected

[
  {
    "vendor": "traccar",
    "product": "traccar",
    "versions": [
      {
        "version": "< 6.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

22.6%