Description
Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2726 | Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates. |
Github GHSA |
GHSA-fjhg-96cp-6fcw | Kimai (Authenticated) SSTI to RCE by Uploading a Malicious Twig File |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T20:37:40.150Z
Reserved: 2023-10-19T20:34:00.948Z
Link: CVE-2023-46245
No data.
Status : Modified
Published: 2023-10-31T16:15:09.697
Modified: 2024-11-21T08:28:09.447
Link: CVE-2023-46245
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA