Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates.
References
Configurations
History
21 Nov 2024, 08:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kimai/kimai/commit/38e37f1c2e91e1acb221ec5c13f11b735bd50ae4 - | |
References | () https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw - Exploit, Vendor Advisory |
12 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates. |
Information
Published : 2023-10-31 16:15
Updated : 2024-11-21 08:28
NVD link : CVE-2023-46245
Mitre link : CVE-2023-46245
CVE.ORG link : CVE-2023-46245
JSON object : View
Products Affected
kimai
- kimai
CWE