Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates.
References
Configurations
History
21 Nov 2024, 08:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kimai/kimai/commit/38e37f1c2e91e1acb221ec5c13f11b735bd50ae4 - | |
References | () https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw - Exploit, Vendor Advisory |
12 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates. |
08 Nov 2023, 23:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
First Time |
Kimai
Kimai kimai |
|
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:kimai:kimai:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw - Exploit, Vendor Advisory |
31 Oct 2023, 17:07
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-31 16:15
Updated : 2024-11-21 08:28
NVD link : CVE-2023-46245
Mitre link : CVE-2023-46245
CVE.ORG link : CVE-2023-46245
JSON object : View
Products Affected
kimai
- kimai
CWE