CVE-2023-32308

anuko timetracker is an open source time tracking system. Boolean-based blind SQL injection vulnerability existed in Time Tracker invoices.php in versions prior to 1.22.11.5781. This was happening because of a coding error after validating parameters in POST requests. There was no check for errors before adjusting invoice sorting order. Because of this, it was possible to craft a POST request with malicious SQL for Time Tracker database. This issue has been fixed in version 1.22.11.5781. Users are advised to upgrade. Users unable to upgrade may insert an additional check for errors in a condition before calling `ttGroupHelper::getActiveInvoices()` in invoices.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anuko:time_tracker:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://github.com/anuko/timetracker/commit/8a7367d7f77ea697c090f5ca4e19669181cc7bcf - Patch () https://github.com/anuko/timetracker/commit/8a7367d7f77ea697c090f5ca4e19669181cc7bcf - Patch
References () https://github.com/anuko/timetracker/security/advisories/GHSA-9g2c-7c7g-p58r - Vendor Advisory () https://github.com/anuko/timetracker/security/advisories/GHSA-9g2c-7c7g-p58r - Vendor Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.2

Information

Published : 2023-05-15 21:15

Updated : 2024-11-21 08:03


NVD link : CVE-2023-32308

Mitre link : CVE-2023-32308

CVE.ORG link : CVE-2023-32308


JSON object : View

Products Affected

anuko

  • time_tracker
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')