Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates.
References
Link | Resource |
---|---|
https://github.com/kimai/kimai/commit/38e37f1c2e91e1acb221ec5c13f11b735bd50ae4 | |
https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-10-31 16:15
Updated : 2024-01-12 17:15
NVD link : CVE-2023-46245
Mitre link : CVE-2023-46245
CVE.ORG link : CVE-2023-46245
JSON object : View
Products Affected
kimai
- kimai
CWE