Vulnerabilities > CVE-2005-0479 - Remote vulnerability in TrackerCam

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
trackercam
nessus
exploit available

Summary

Directory traversal vulnerability in ComGetLogFile.php3 for TrackerCam 5.12 and earlier allows remote attackers to read arbitrary files via ".." sequences and (1) "/" slash), (2) "\" (backslash), or (3) hex-encoded characters in the fn parameter.

Vulnerable Configurations

Part Description Count
Application
Trackercam
1

Exploit-Db

descriptionTrackerCam 5.12 ComGetLogFile.php3 fm Parameter Traversal Arbitrary File Access. CVE-2005-0479. Webapps exploit for php platform
idEDB-ID:25123
last seen2016-02-03
modified2005-02-18
published2005-02-18
reporterLuigi Auriemma
sourcehttps://www.exploit-db.com/download/25123/
titleTrackerCam 5.12 ComGetLogFile.php3 fm Parameter Traversal Arbitrary File Access

Nessus

NASL familyCGI abuses
NASL idTRACKERCAM_MULTIPLE_VULNERABILITIES.NASL
descriptionThe remote host is running TrackerCam, a HTTP software that allows a user to publish a webcam feed thru a website. The remote version of this software is affected by multiple vulnerabilities : - Buffer overflows which may allow an attacker to execute arbitrary code on the remote host. - A directory traversal bug that may allow an attacker to read arbitrary files on the remote host with the privileges of the web server daemon. - A cross-site scripting issue that may allow an attacker to use the remote host to perform a cross-site scripting attack.
last seen2020-06-01
modified2020-06-02
plugin id17160
published2005-02-21
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17160
titleTrackerCam Multiple Remote Vulnerabilities