anuko timetracker is an open source time tracking system. Boolean-based blind SQL injection vulnerability existed in Time Tracker invoices.php in versions prior to 1.22.11.5781. This was happening because of a coding error after validating parameters in POST requests. There was no check for errors before adjusting invoice sorting order. Because of this, it was possible to craft a POST request with malicious SQL for Time Tracker database. This issue has been fixed in version 1.22.11.5781. Users are advised to upgrade. Users unable to upgrade may insert an additional check for errors in a condition before calling `ttGroupHelper::getActiveInvoices()` in invoices.php.
References
Configurations
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/anuko/timetracker/commit/8a7367d7f77ea697c090f5ca4e19669181cc7bcf - Patch | |
References | () https://github.com/anuko/timetracker/security/advisories/GHSA-9g2c-7c7g-p58r - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
Information
Published : 2023-05-15 21:15
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32308
Mitre link : CVE-2023-32308
CVE.ORG link : CVE-2023-32308
JSON object : View
Products Affected
anuko
- time_tracker
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')