CVE-2021-43851
CVSS V2 Medium 6.5
CVSS V3 High 8.8
Description
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. SQL injection vulnerability exist in multiple files in Time Tracker version 1.19.33.5606 and prior due to not properly checking of the "group" and "status" parameters in POST requests. Group parameter is posted along when navigating between organizational subgroups (groups.php file). Status parameter is used in multiple files to change a status of an entity such as making a project, task, or user inactive. This issue has been patched in version 1.19.33.5607. An upgrade is highly recommended. If an upgrade is not practical, introduce ttValidStatus function as in the latest version and start using it user input check blocks wherever status field is used. For groups.php fix, introduce ttValidInteger function as in the latest version and use it in the access check block in the file.
Overview
- CVE ID
- CVE-2021-43851
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-12-22T00:15:09
- Last Modified Date
- 2021-12-28T14:58:23
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:anuko:time_tracker:*:*:*:*:*:*:*:* | 1 | OR | 1.19.33.5607 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:S/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.5
- Severity
- MEDIUM
- Exploitability Score
- 8
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.8
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://github.com/anuko/timetracker/security/advisories/GHSA-wx6x-6rq3-pqcc | Third Party Advisory |
https://github.com/anuko/timetracker/commit/0cf32f1046418aa2e5218b0b370064820c330c6a | Patch Third Party Advisory |
https://github.com/anuko/timetracker/commit/94fda0cc0c9c20ab98d38ccc75ff040d13dc7f1b | Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-43851 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43851 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:40:11 | Added to TrackCVE | |||
2022-12-06 04:32:00 | 2021-12-22T00:15Z | 2021-12-22T00:15:09 | CVE Published Date | updated |
2022-12-06 04:32:00 | 2021-12-28T14:58:23 | CVE Modified Date | updated | |
2022-12-06 04:32:00 | Analyzed | Vulnerability Status | updated |