.. / CVE-2024-6188

Exploit for TrakSYS 11.x.x - Sensitive Data Exposure (CVE-2024-6188)

Description:

A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Nuclei Template

View the template here CVE-2024-6188.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2024/CVE-2024-6188.yaml
Copy

References:

https://kiwiyumi.com/post/tracksys-export-source-code/
https://nvd.nist.gov/vuln/detail/CVE-2024-6188
https://debricked.com/vulnerability-database/vulnerability/CVE-2024-6188
https://www.incibe.es/en/incibe-cert/early-warning/vulnerabilities/cve-2024-6188