Anuko Time Tracker is an open source, web-based time tracking application written in PHP. ttUser.class.php in Time Tracker versions prior to 1.20.0.5646 was not escaping primary group name for display. Because of that, it was possible for a logged in user to modify primary group name with elements of JavaScript. Such script could then be executed in user browser on subsequent requests on pages where primary group name was displayed. This is vulnerability has been fixed in version 1.20.0.5646. Users who are unable to upgrade may modify ttUser.class.php to use an additional call to htmlspecialchars when printing group name.
References
Link | Resource |
---|---|
https://github.com/anuko/timetracker/commit/6aaad31630500d13b6c8459daa9f406fd5eb4330 | Patch Third Party Advisory |
https://github.com/anuko/timetracker/security/advisories/GHSA-rgcm-xgvj-5mqh | Third Party Advisory |
Configurations
Information
Published : 2022-02-24 08:15
Updated : 2022-03-04 09:43
NVD link : CVE-2022-24708
Mitre link : CVE-2022-24708
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
anuko
- time_tracker