Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In TimeTracker before version 1.19.24.5415 tokens used in password reset feature in Time Tracker are based on system time and, therefore, are predictable. This opens a window for brute force attacks to guess user tokens and, once successful, change user passwords, including that of a system administrator. This vulnerability is pathced in version 1.19.24.5415 (started to use more secure tokens) with an additional improvement in 1.19.24.5416 (limited an available window for brute force token guessing).
References
Link | Resource |
---|---|
https://github.com/anuko/timetracker/commit/40f3d9345adc20e6f28eb9f59e2489aff87fecf5 | Patch Third Party Advisory |
https://github.com/anuko/timetracker/security/advisories/GHSA-43c9-rx4h-4gqq | Mitigation Third Party Advisory |
https://www.anuko.com/time-tracker/index.htm | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-03-03T00:20:16
Updated: 2021-03-03T00:20:16
Reserved: 2020-12-22T00:00:00
Link: CVE-2021-21352
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-03-03T01:15:13.427
Modified: 2021-03-09T15:51:41.237
Link: CVE-2021-21352
JSON object: View
Redhat Information
No data.
CWE