Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates.
References
| Link | Resource |
|---|---|
| https://github.com/kimai/kimai/commit/38e37f1c2e91e1acb221ec5c13f11b735bd50ae4 | |
| https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw | Exploit Vendor Advisory |
Configurations
History
12 Jan 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | (en) Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates. |
Information
Published : 2023-10-31 16:15
Updated : 2024-01-12 17:15
NVD link : CVE-2023-46245
Mitre link : CVE-2023-46245
CVE.ORG link : CVE-2023-46245
JSON object : View
Products Affected
kimai
- kimai
CWE
