Описание
Leantime is an open source project management system. A 'userId' variable in app/domain/files/repositories/class.files.php is not parameterized. An authenticated attacker can send a carefully crafted POST request to /api/jsonrpc to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Ссылки
- Patch
- Vendor Advisory
- Patch
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.4 (исключая)
Одно из
cpe:2.3:a:leantime:leantime:*:*:*:*:*:*:*:*
cpe:2.3:a:leantime:leantime:2.4:-:*:*:*:*:*:*
cpe:2.3:a:leantime:leantime:2.4:beta:*:*:*:*:*:*
cpe:2.3:a:leantime:leantime:2.4:beta2:*:*:*:*:*:*
cpe:2.3:a:leantime:leantime:2.4:beta3:*:*:*:*:*:*
EPSS
Процентиль: 94%
0.1359
Средний
6.5 Medium
CVSS3
Дефекты
CWE-89
CWE-89
EPSS
Процентиль: 94%
0.1359
Средний
6.5 Medium
CVSS3
Дефекты
CWE-89
CWE-89