CVE-2017-17714
Description
Trape before 2017-11-05 has XSS via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, the /register lat parameter, the /register lon parameter, the /register org parameter, the /register query parameter, the /register region parameter, the /register regionName parameter, the /register timezone parameter, the /register vId parameter, the /register zip parameter, or the /tping id parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Trape before 2017-11-05 is vulnerable to reflected XSS via multiple parameters in /nr, /register, and /tping endpoints.
Vulnerability
Trape versions before 2017-11-05 (Community and Professional) are vulnerable to reflected cross-site scripting (XSS) in the /nr, /register, and /tping endpoints. The vulnerable parameters include red and vId in /nr; User-Agent HTTP header, country, countryCode, cpu, isp, lat, lon, org, query, region, regionName, timezone, vId, and zip in /register; and id in /tping [1][2]. Input from these parameters is not properly sanitized before being reflected in the response, allowing arbitrary HTML or JavaScript injection.
Exploitation
An attacker can exploit this vulnerability by crafting a malicious URL or HTTP request containing JavaScript payloads in any of the listed parameters. The victim must be tricked into visiting the crafted URL or sending a request that includes the malicious payload (e.g., via a link or by manipulating the User-Agent). The server then reflects the payload in the response, which executes in the victim's browser. No authentication is required to trigger the XSS, but the victim must have access to the trape web interface.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session with the trape application. This can lead to session hijacking, theft of sensitive data displayed in the interface (e.g., tracking information), or performing actions on behalf of the victim. The scope is limited to the trape application's domain and the privileges of the victim user.
Mitigation
The vulnerability is fixed in versions released after 2017-11-05. Users should update to the latest version of trape. The relevant commit [1] addresses the underlying input handling issues. No other workarounds are documented; users are advised to restrict access to the trape web interface to trusted networks only.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/boxug/trape/commit/628149159ba25adbfc29a3ae1d4b10c7eb936dd3nvdIssue TrackingPatchThird Party Advisory
- www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/nvdExploitIssue TrackingPatchThird Party Advisory
- www.youtube.com/watchnvdExploitIssue TrackingThird Party Advisory
News mentions
0No linked articles in our index yet.