The discovery of CVE-2024-31214 has uncovered a grave vulnerability within Traccar, the open-source GPS tracking system, affecting versions 5.1 through 5.12. This vulnerability allows for the execution of arbitrary file uploads through the device image upload API, granting attackers extensive control over file manipulation, directory access, and file extensions.
Although direct overwriting of existing files is not feasible, threat actors can create new files with customized names and extensions, potentially resulting in severe consequences such as remote code execution, cross-site scripting (XSS), and denial-of-service (DOS) attacks.
Exacerbating the situation is Traccar’s default configuration, which enables self-registration by default, making exploitation effortless for any user. Urgent action is paramount, urging users to promptly upgrade to version 6.0, where a patch is available to address the vulnerability.
Moreover, implementing mitigative measures like disabling self-registration can significantly enhance the system’s resilience against exploitation, thereby safeguarding critical data and operations from potential threats.
Reference: