Vulnerabilities > CVE-2005-0479 - Remote vulnerability in TrackerCam
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Directory traversal vulnerability in ComGetLogFile.php3 for TrackerCam 5.12 and earlier allows remote attackers to read arbitrary files via ".." sequences and (1) "/" slash), (2) "\" (backslash), or (3) hex-encoded characters in the fn parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | TrackerCam 5.12 ComGetLogFile.php3 fm Parameter Traversal Arbitrary File Access. CVE-2005-0479. Webapps exploit for php platform |
id | EDB-ID:25123 |
last seen | 2016-02-03 |
modified | 2005-02-18 |
published | 2005-02-18 |
reporter | Luigi Auriemma |
source | https://www.exploit-db.com/download/25123/ |
title | TrackerCam 5.12 ComGetLogFile.php3 fm Parameter Traversal Arbitrary File Access |
Nessus
NASL family | CGI abuses |
NASL id | TRACKERCAM_MULTIPLE_VULNERABILITIES.NASL |
description | The remote host is running TrackerCam, a HTTP software that allows a user to publish a webcam feed thru a website. The remote version of this software is affected by multiple vulnerabilities : - Buffer overflows which may allow an attacker to execute arbitrary code on the remote host. - A directory traversal bug that may allow an attacker to read arbitrary files on the remote host with the privileges of the web server daemon. - A cross-site scripting issue that may allow an attacker to use the remote host to perform a cross-site scripting attack. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17160 |
published | 2005-02-21 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/17160 |
title | TrackerCam Multiple Remote Vulnerabilities |