8.8
CVSSv3

CVE-2022-24707

Published: 24/02/2022 Updated: 12/05/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Anuko Time Tracker is an open source, web-based time tracking application written in PHP. UNION SQL injection and time-based blind injection vulnerabilities existed in Time Tracker Puncher plugin in versions of anuko timetracker before 1.20.0.5642. This was happening because the Puncher plugin was reusing code from other places and was relying on an unsanitized date parameter in POST requests. Because the parameter was not checked, it was possible to craft POST requests with malicious SQL for Time Tracker database. This issue has been resolved in in version 1.20.0.5642. Users unable to upgrade are advised to add their own checks to input.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

anuko time tracker

Exploits

Anuko Time Tracker version 12005640 suffers from a remote SQL injection vulnerability ...

Github Repositories

PoC of CVE-2022-24707

PoC for CVE-2022-24707 SQL Injection Vulnerability on Puncher plugin A POST request can be crafted to exploit SQL Injection and leak database contents This is tested on Anuko Time Tracker 12005640 python3 exploitpy --help usage: exploitpy [-h] --username USERNAME --password PASSWORD --host HOST [--sqli SQLI]