1 results (0.003 seconds)

CVSS: 6.8EPSS: 12%CPEs: 5EXPL: 0

19 Oct 2023 — Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. • https://github.com/Leantime/leantime/commit/be75f1e0f311d11c00a0bdc7079a62eef3594bf0 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •