Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-24809
HistoryApr 10, 2024 - 2:48 p.m.

CVE-2024-24809 Traccar vulnerable to Path Traversal: 'dir/../../filename' and Unrestricted Upload of File with Dangerous Type

2024-04-1014:48:13
CWE-27
CWE-434
GitHub_M
github.com
2
traccar
gps tracking
path traversal
unrestricted upload
security vulnerability
file upload
version 6.0
phishing
cross-site scripting
arbitrary commands

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

22.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix device. under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue.

CNA Affected

[
  {
    "vendor": "traccar",
    "product": "traccar",
    "versions": [
      {
        "status": "affected",
        "version": "< 6.0"
      }
    ]
  }
]

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

22.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial