By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Critical Flaws in Traccar GPS System Expose Users to Remote Attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Critical Flaws in Traccar GPS System Expose Users to Remote Attacks
Tech News

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

By Viral Trending Content 3 Min Read
Share
SHARE

Aug 26, 2024Ravie LakshmananSoftware Security / Vulnerability

Traccar GPS System

Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution under certain circumstances.

Both the vulnerabilities are path traversal flaws and could be weaponized if guest registration is enabled, which is the default configuration for Traccar 5, Horizon3.ai researcher Naveen Sunkavally said.

A brief description of the shortcomings is as follows –

  • CVE-2024-24809 (CVSS score: 8.5) – Path Traversal: ‘dir/../../filename’ and unrestricted upload of file with dangerous type
  • CVE-2024-31214 (CVSS score: 9.7) – Unrestricted file upload vulnerability in device image upload could lead to remote code execution
Cybersecurity

“The net result of CVE-2024-31214 and CVE-2024-24809 is that an attacker can place files with arbitrary content anywhere on the file system,” Sunkavally said. “However an attacker only has partial control over the filename.”

The issues have to do with how the program handles device image file uploads, effectively allowing an attacker to overwrite certain files on the file system and trigger code execution. This includes files matching the below naming format –

  • device.ext, where the attacker can control ext, but there MUST be an extension
  • blah”, where the attacker can control blah but the filename must end with a double quote
  • blah1″;blah2=blah3, where the attacker can control blah1, blah2, and blah3, but the double quote semicolon sequence and equals symbol MUST be present
Traccar GPS System

In a hypothetical proof-of-concept (PoC) devised by Horizon3.ai, an adversary can exploit the path traversal in the Content-Type header to upload a crontab file and obtain a reverse shell on the attacker host.

This attack method, however, does not work on Debian/Ubuntu-based Linux systems due to file naming restrictions that bar crontab files from having periods or double quotes.

Cybersecurity

An alternative mechanism entails taking advantage of Traccar being installed as a root-level user to drop a kernel module or configuring an udev rule to run an arbitrary command every time a hardware event is raised.

On susceptible Windows instances, remote code execution could also be achieved by placing a shortcut (LNK) file named “device.lnk” in the C:ProgramDataMicrosoftWindowsStart MenuProgramsStartUp folder, which gets subsequently executed when any victim user logs into the Traccar host.

Traccar versions 5.1 to 5.12 are vulnerable to CVE-2024-31214 and CVE-2024-2809. The issues have been addressed with the release of Traccar 6 in April 2024 which turns off self-registration by default, thereby reducing the attack surface.

“If the registration setting is true, readOnly is false, and deviceReadonly is false, then an unauthenticated attacker can exploit these vulnerabilities,” Sunkavally said. “These are the default settings for Traccar 5.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

TruthScan vs. BrandWell: Which Should Be Your AI Image Detector?

AI adoption with API readiness platform Jentic 

Terrifying New Photos Emerge From the Jeffrey Epstein Estate

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

All-island coordination needed to unlock tech scale-up opportunities

TAGGED: Cyber Security, Cybersecurity, GPS Tracking, Internet, Linux security, Path Traversal, Remote Code Execution, software security, Vulnerability, windows security
Share This Article
Facebook Twitter Copy Link
Previous Article Stripe plans new tender offer to buy back employee shares
Next Article Matching dinosaur footprints found on opposite sides of the Atlantic
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Crypto Crime Escalates: Chainalysis Data Shows Over $3.4 Billion Stolen This Year
Crypto
TruthScan vs. BrandWell: Which Should Be Your AI Image Detector?
Tech News
The fear of being perceived
Sports
EU agrees €90bn loan to Ukraine after frozen Russian asset plan fails
Business
What is so unusual about UK job postings since the pandemic?
Business
What free games are on Epic Games Store today (Dec. 18)?
Gaming News
Man suspected in shooting at Brown University found dead, officials say
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

TruthScan vs. BrandWell: Which Should Be Your AI Image Detector?

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
TruthScan vs. BrandWell: Which Should Be Your AI Image Detector?
December 19, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?