Exploit
CVE-2024-24809

Path Traversal: 'dir/../../filename' (CWE-27)

Published: Apr 10, 2024 / Updated: 7mo ago

010
CVSS 8.5EPSS 0.04%High
CVE info copied to clipboard

Summary

Traccar, an open source GPS tracking system, contains a vulnerability in versions prior to 6.0 that allows path traversal and unrestricted upload of files with dangerous types. The system allows registration by default, enabling attackers to acquire ordinary user permissions and exploit this vulnerability to upload files with the prefix `device.` under any folder.

Impact

This vulnerability can be exploited for phishing attacks, cross-site scripting (XSS) attacks, and potentially executing arbitrary commands on the server. The vulnerability has a high impact on integrity, low impact on availability, and no direct impact on confidentiality. The attack vector is network-based, with low attack complexity and requiring low privileges, no user interaction, and has a changed scope. Multiple proof-of-concept exploits are available on GitHub, increasing the likelihood of exploitation.

Exploitation

Multiple proof-of-concept exploits are available on github.com, github.com. Its exploitation has been reported by various sources, including rapid7.com.

Patch

A patch is available in Traccar version 6.0. Organizations using versions prior to 6.0 should prioritize upgrading to this latest version to address the vulnerability.

Mitigation

1. Upgrade Traccar to version 6.0 or later immediately. 2. If immediate upgrading is not possible, implement strict access controls and monitor file uploads closely. 3. Disable user registration if not necessary, or implement additional verification steps for new accounts. 4. Implement strong input validation and sanitization for all user-supplied data, especially file uploads. 5. Use a Web Application Firewall (WAF) to help detect and block potential exploitation attempts. 6. Regularly audit and monitor server logs for any suspicious activities or unauthorized file uploads.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

Timeline

CVE Assignment

NVD published the first details for CVE-2024-24809

Apr 10, 2024 at 3:16 PM
CVSS

A CVSS base score of 8.5 has been assigned.

Apr 10, 2024 at 3:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-24809. See article

Apr 10, 2024 at 3:24 PM / National Vulnerability Database
EPSS

EPSS Score was set to: 0.04% (Percentile: 7.9%)

Apr 11, 2024 at 9:54 AM
Threat Intelligence Report

CVE-2024-24809 is a critical path traversal vulnerability in Traccar 5 that allows unauthenticated attackers to upload files with arbitrary content to the file system. This vulnerability has the potential for remote code execution and could be exploited by malicious actors if guest registration is enabled. Mitigations include disabling guest registration and applying patches provided by Traccar to address the issue. See article

Aug 23, 2024 at 1:23 PM
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Sep 3, 2024 at 1:44 PM
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Sep 24, 2024 at 10:10 AM
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 24, 2024 at 10:15 AM
Exploitation in the Wild

Attacks in the wild have been reported by Metasploit - Rapid7 Cybersecurity Blog. See article

Sep 27, 2024 at 7:26 PM / Metasploit - Rapid7 Cybersecurity Blog
Static CVE Timeline Graph

Affected Systems

Traccar/server
+null more

Exploits

https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/traccar_rce_upload.rb
+null more

Links to Mitre Att&cks

T1574.010: Services File Permissions Weakness
+null more

Attack Patterns

CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs
+null more

References

Traccar 5 Remote Code Execution Vulnerabilities – Horizon3.ai
Exploiting these vulnerabilities can lead to remote code execution through various methods, such as uploading crontab files or kernel modules. The following proof-of-concept code self-registers a Traccar user and then exploits the path traversal in the header to upload a file, resulting in a reverse shell on the attacker host.
Two Remote Code Execution Vulnerabilities Discovered in Traccar GPS Tracking System
The following proof-of-concept code self-registers a Traccar user and then exploits the path traversal in the header to upload a file, resulting in a reverse shell on the attacker host. This post covers two related path traversal vulnerabilities affecting Traccar 5 that could lead to remote code execution: CVE-2024-31214, reported by Horizon3.ai, and CVE-2024-24809, reported by @yiliufeng168 .
Critical Flaws in Traccar GPS System Expose Users to Remote Attacks
Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution under certain circumstances. The issues have to do with how the program handles device image file uploads, effectively allowing an attacker to overwrite certain files on the file system and trigger code execution.
See 6 more references

News

Metasploit Weekly Wrap-Up: 11/15/2024
Description: Adds a module to chain CVE-2024-5910, a password reset vulnerability with CVE-2024-9464, an authenticated command-injection vulnerability to gain code execution on PaloAlto Expedition servers between versions after 1.2 and before 1.2.92 with or without knowledge of the credentials. The module makes use of both vulnerabilities in order to obtain unauthenticated RCE in the context of the user www-data.
Metasploit Weekly Wrap-Up
Description: Adds a module to chain CVE-2024-5910, a password reset vulnerability with CVE-2024-9464, an authenticated command-injection vulnerability to gain code execution on PaloAlto Expedition servers between versions after 1.2 and before 1.2.92 with or without knowledge of the credentials. The module makes use of both vulnerabilities in order to obtain unauthenticated RCE in the context of the user www-data.
Metasploit Weekly Wrap-Up: 11/15/2024
Description: Adds a module to chain CVE-2024-5910, a password reset vulnerability with CVE-2024-9464, an authenticated command-injection vulnerability to gain code execution on PaloAlto Expedition servers between versions after 1.2 and before 1.2.92 with or without knowledge of the credentials. The module makes use of both vulnerabilities in order to obtain unauthenticated RCE in the context of the user www-data.
VulnCheck Initial Access Intelligence Update - September 2024
VulnCheck Initial Access Intelligence equips organizations and security teams with detection artifacts including Suricata signatures, YARA rules, PCAPs, and private exploit PoCs to defend against initial access vulnerabilities that are either already being exploited or likely to be exploited soon. In September 2024, VulnCheck crossed 290+ Initial Access Intelligence (IAI) artifacts, developing artifacts for 16 CVEs, covering 14 different vendors and products.
Metasploit Weekly Wrap-Up 09/27/2024
Description: This adds a new auxiliary module that exploits a time-based SQL injection vulnerability in VICIdial to enumerate admin credentials. Description: This is a new module which exploits an account takeover vulnerability in Cisco Smart Software Manager (SSM) On-Prem <= 8-202206, by changing the password of the admin user to one that is attacker-controlled.
See 52 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Changed
Confidentiality:None
Integrity:High
Availability Impact:Low

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI