Skip to content

H3-2024-0030

Traccar Device Image Upload Remote Code Execution Vulnerability

Category VULNERABILITY
Base Score 9.0

Description

Traccar 5.1 to 5.12 is vulnerable to path traversal in the device image upload API of the web server component. This allows Traccar users to upload files with certain restricted names anywhere on the target file system.

Impact

Remote attackers can execute arbitrary commands on the server. On Linux hosts, where Traccar typically runs as root, this can lead to full system compromise. If user self-registration is enabled, which is the default setting in Traccar 5, this vulnerability allows anyone to log in and compromise the Traccar server. Depending on the target host, user login or a host reboot may be required to trigger remote code execution.

References