Description
Trape before 2017-11-05 has SQL injection via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, the /register lat parameter, the /register lon parameter, the /register org parameter, the /register query parameter, the /register region parameter, the /register regionName parameter, the /register timezone parameter, the /register vId parameter, the /register zip parameter, or the /tping id parameter.
References (5)
Core 5
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://www.youtube.com/watch?v=Txp6IwR24jY
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://github.com/boxug/trape/commit/628149159ba25adbfc29a3ae1d4b10c7eb936dd3
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://www.youtube.com/watch?v=RWw1UTeZee8
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://www.youtube.com/watch?v=efmvL235S-8
Scores
CVSS v3
9.8
EPSS
0.0036
EPSS Percentile
57.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-89
Status
published
Products (1)
boxug/trape
< 2017-11-05
Published
Dec 16, 2017
Tracked Since
Feb 18, 2026