CVE-2021-21352

Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In TimeTracker before version 1.19.24.5415 tokens used in password reset feature in Time Tracker are based on system time and, therefore, are predictable. This opens a window for brute force attacks to guess user tokens and, once successful, change user passwords, including that of a system administrator. This vulnerability is pathced in version 1.19.24.5415 (started to use more secure tokens) with an additional improvement in 1.19.24.5416 (limited an available window for brute force token guessing).
Configurations

Configuration 1 (hide)

cpe:2.3:a:anuko:time_tracker:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:48

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 9.1
v2 : 5.0
v3 : 6.8
References () https://github.com/anuko/timetracker/commit/40f3d9345adc20e6f28eb9f59e2489aff87fecf5 - Patch, Third Party Advisory () https://github.com/anuko/timetracker/commit/40f3d9345adc20e6f28eb9f59e2489aff87fecf5 - Patch, Third Party Advisory
References () https://github.com/anuko/timetracker/security/advisories/GHSA-43c9-rx4h-4gqq - Mitigation, Third Party Advisory () https://github.com/anuko/timetracker/security/advisories/GHSA-43c9-rx4h-4gqq - Mitigation, Third Party Advisory
References () https://www.anuko.com/time-tracker/index.htm - Vendor Advisory () https://www.anuko.com/time-tracker/index.htm - Vendor Advisory

Information

Published : 2021-03-03 01:15

Updated : 2024-11-21 05:48


NVD link : CVE-2021-21352

Mitre link : CVE-2021-21352

CVE.ORG link : CVE-2021-21352


JSON object : View

Products Affected

anuko

  • time_tracker
CWE
CWE-330

Use of Insufficiently Random Values