Anuko Time Tracker is an open source, web-based time tracking application written in PHP. UNION SQL injection and time-based blind injection vulnerabilities existed in Time Tracker Puncher plugin in versions of anuko timetracker prior to 1.20.0.5642. This was happening because the Puncher plugin was reusing code from other places and was relying on an unsanitized date parameter in POST requests. Because the parameter was not checked, it was possible to craft POST requests with malicious SQL for Time Tracker database. This issue has been resolved in in version 1.20.0.5642. Users unable to upgrade are advised to add their own checks to input.
References
Link | Resource |
---|---|
https://github.com/anuko/timetracker/commit/0e2d6563e2d969209c502a1eae4ddd8e87b73299 | Patch Third Party Advisory |
https://github.com/anuko/timetracker/security/advisories/GHSA-wqx7-95fx-wjxj | Third Party Advisory |
http://packetstormsecurity.com/files/167060/Anuko-Time-Tracker-1.20.0.5640-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2022-02-24 08:15
Updated : 2022-05-12 12:36
NVD link : CVE-2022-24707
Mitre link : CVE-2022-24707
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
anuko
- time_tracker