{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-32306","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-05-08T13:26:03.877Z","datePublished":"2023-05-12T18:52:59.374Z","dateUpdated":"2025-01-23T20:27:39.713Z"},"containers":{"cna":{"title":"Time Tracker has Blind SQL Injection Vulnerability in Reports","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/anuko/timetracker/security/advisories/GHSA-758x-vg7g-j9j3","tags":["x_refsource_CONFIRM"],"url":"https://github.com/anuko/timetracker/security/advisories/GHSA-758x-vg7g-j9j3"}],"affected":[{"vendor":"anuko","product":"timetracker","versions":[{"version":"< 1.22.13.5792","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-05-12T18:52:59.374Z"},"descriptions":[{"lang":"en","value":"Time Tracker is an open source time tracking system. A time-based blind injection vulnerability existed in Time Tracker reports in versions prior to 1.22.13.5792. This was happening because the `reports.php` page was not validating all parameters in POST requests. Because some parameters were not checked, it was possible to craft POST requests with malicious SQL for Time Tracker database. This issue is fixed in version 1.22.13.5792. As a workaround, use the fixed code in `ttReportHelper.class.php` from version 1.22.13.5792."}],"source":{"advisory":"GHSA-758x-vg7g-j9j3","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:10:24.449Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/anuko/timetracker/security/advisories/GHSA-758x-vg7g-j9j3","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/anuko/timetracker/security/advisories/GHSA-758x-vg7g-j9j3"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-23T20:27:15.509612Z","id":"CVE-2023-32306","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-23T20:27:39.713Z"}}]}}