Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-24809
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Traccar vulnerable to Path Traversal: 'dir/../../filename' and Unrestricted Upload of File with Dangerous Type
Source: NVD (National Vulnerability Database)
Vulnerability Description
Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix `device.` under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
路径遍历:’dir/../../filename’
Source: NVD (National Vulnerability Database)
Vulnerability Title
Traccar 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Traccar是美国Traccar公司的一个基于Java的可提供GPS跟踪功能的建站系统。该软件支持170多种GPS协议和1500多种型号的GPS跟踪设备。Traccar可以与任何主要的SQL数据库系统一起使用。它还提供了易于使用的REST API。 Traccar 5.12及之前版本存在安全漏洞,该漏洞源于容易受到路径遍历和危险类型文件无限制上传的影响,攻击者可以通过注册账户获取普通用户权限,并利用该漏洞上传任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
traccartraccar < 6.0 -
II. Public POCs for CVE-2024-24809
#POC DescriptionSource LinkShenlong Link
1Critical Flaws in Traccar GPS System Expose Users to Remote Attackshttps://github.com/fa-rrel/CVE-2024-24809-Proof-of-conceptPOC Details
2Critical Flaws in Traccar GPS System Expose Users to Remote Attackshttps://github.com/gh-ost00/CVE-2024-24809-Proof-of-conceptPOC Details
3Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix `device.` under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24809.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-24809
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-24809

No comments yet


Leave a comment