Vulnerability CVE-2017-17098


Published: 2018-01-02

Description:
The writeLog function in fn_common.php in gps-server.net GPS Tracking Software (self hosted) through 3.0 allows remote attackers to inject arbitrary PHP code via a crafted request that is mishandled during admin log viewing, as demonstrated by <?php system($_GET[cmd]); ?> in a login request.

See advisories in our WLB2 database:
Topic
Author
Date
High
gps-server.net GPS Tracking Software < 3.1 Multiple Vulnerabilities
Noman Riffat
05.01.2018

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Gps-server -> Gps tracking software 

 References:
https://gist.github.com/pak0s/ea7a80c2614d9cd43cfb8230c65c9fec
https://s1.gps-server.net/changelog.txt
https://www.exploit-db.com/exploits/43431/

Copyright 2024, cxsecurity.com

 

Back to Top