POC详情: 125d3b4a6f753197b50f206afce42aea874d60ef

来源
关联漏洞
标题: Traccar 安全漏洞 (CVE-2024-24809)
描述:Traccar是美国Traccar公司的一个基于Java的可提供GPS跟踪功能的建站系统。该软件支持170多种GPS协议和1500多种型号的GPS跟踪设备。Traccar可以与任何主要的SQL数据库系统一起使用。它还提供了易于使用的REST API。 Traccar 5.12及之前版本存在安全漏洞,该漏洞源于容易受到路径遍历和危险类型文件无限制上传的影响,攻击者可以通过注册账户获取普通用户权限,并利用该漏洞上传任意文件。
描述
Critical Flaws in Traccar GPS System Expose Users to Remote Attacks
介绍
### CVE-2024-24809 Detail

#Description
Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. 
Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix `device.` under 
any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue.

#usage
```bash
Fofa query : app="traccar"
```
```bash
nuclei --target {target.com} -t CVE-2024-24809.yaml
```
#Proof of concept (using burpsuite)
```bash
POST /api/users HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded;charset=UTF-8

{"name": "{{name}}", "email": "{{email}}", "password": "{{password}}", "totpKey": null}
```
#Testing account
```bash
name: "ghostsec"
password: "ghostsec"
email: "ghostsec@ghostsec.com"
```

### How to fix?
Upgrade org.traccar:traccar to version 6.0 or higher.
文件快照

[4.0K] /data/pocs/125d3b4a6f753197b50f206afce42aea874d60ef ├── [4.4K] CVE-2024-24809.yaml ├── [3.8K] poc.py └── [1.1K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。