Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates.
References
Link | Resource |
---|---|
https://github.com/kimai/kimai/commit/38e37f1c2e91e1acb221ec5c13f11b735bd50ae4 | |
https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-10-31T15:06:23.359Z
Updated: 2024-01-12T16:38:46.831Z
Reserved: 2023-10-19T20:34:00.948Z
Link: CVE-2023-46245
JSON object: View
NVD Information
Status : Modified
Published: 2023-10-31T16:15:09.697
Modified: 2024-01-12T17:15:09.400
Link: CVE-2023-46245
JSON object: View
Redhat Information
No data.