Vulnerability Description
Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. Version 2.1.0 enables security measures for custom Twig templates.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kimai | Kimai | <= 2.10 |
Related Weaknesses (CWE)
References
- https://github.com/kimai/kimai/commit/38e37f1c2e91e1acb221ec5c13f11b735bd50ae4
- https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcwExploitVendor Advisory
- https://github.com/kimai/kimai/commit/38e37f1c2e91e1acb221ec5c13f11b735bd50ae4
- https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcwExploitVendor Advisory
FAQ
What is CVE-2023-46245?
CVE-2023-46245 is a vulnerability with a CVSS score of 7.2 (HIGH). Kimai is a web-based multi-user time-tracking application. Versions prior to 2.1.0 are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The ...
How severe is CVE-2023-46245?
CVE-2023-46245 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46245?
Check the references section above for vendor advisories and patch information. Affected products include: Kimai Kimai.