Vulnerability Description
Traccar GPS Tracking System before version 4.9 has a LDAP injection vulnerability. It occurs when user input is being used in LDAP search filter. By providing specially crafted input, an attacker can modify the logic of the LDAP query and get admin privileges. The issue only impacts instances with LDAP configuration and where users can craft their own names. This has been patched in version 4.9.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Traccar | Traccar | < 4.9 |
Related Weaknesses (CWE)
References
- https://github.com/traccar/traccar/commit/e4f6e74e57ab743b65d49ae00f6624a20ca029PatchThird Party Advisory
- https://github.com/traccar/traccar/security/advisories/GHSA-v955-7g22-2p49Third Party Advisory
- https://github.com/traccar/traccar/commit/e4f6e74e57ab743b65d49ae00f6624a20ca029PatchThird Party Advisory
- https://github.com/traccar/traccar/security/advisories/GHSA-v955-7g22-2p49Third Party Advisory
FAQ
What is CVE-2020-5246?
CVE-2020-5246 is a vulnerability with a CVSS score of 7.7 (HIGH). Traccar GPS Tracking System before version 4.9 has a LDAP injection vulnerability. It occurs when user input is being used in LDAP search filter. By providing specially crafted input, an attacker can ...
How severe is CVE-2020-5246?
CVE-2020-5246 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5246?
Check the references section above for vendor advisories and patch information. Affected products include: Traccar Traccar.