CVE-2023-45826
Authenticated SQL Injection in leantime
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Leantime es un sistema de gestión de proyectos de código abierto. Una variable 'userId' en `app/domain/files/repositories/class.files.php` no está parametrizada. Un atacante autenticado puede enviar una solicitud POST cuidadosamente manipulada a `/api/jsonrpc` para explotar una vulnerabilidad de inyección SQL. La confidencialidad se ve afectada ya que permite descargar información de la base de datos. Este problema se solucionó en la versión 2.4-beta-4. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-10-13 CVE Reserved
- 2023-10-19 CVE Published
- 2024-09-12 CVE Updated
- 2025-02-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Leantime/leantime/commit/be75f1e0f311d11c00a0bdc7079a62eef3594bf0 | 2023-10-27 |
URL | Date | SRC |
---|---|---|
https://github.com/Leantime/leantime/security/advisories/GHSA-559g-3h98-g3fj | 2023-10-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Leantime Search vendor "Leantime" | Leantime Search vendor "Leantime" for product "Leantime" | < 2.4 Search vendor "Leantime" for product "Leantime" and version " < 2.4" | - |
Affected
| ||||||
Leantime Search vendor "Leantime" | Leantime Search vendor "Leantime" for product "Leantime" | 2.4 Search vendor "Leantime" for product "Leantime" and version "2.4" | - |
Affected
| ||||||
Leantime Search vendor "Leantime" | Leantime Search vendor "Leantime" for product "Leantime" | 2.4 Search vendor "Leantime" for product "Leantime" and version "2.4" | beta |
Affected
| ||||||
Leantime Search vendor "Leantime" | Leantime Search vendor "Leantime" for product "Leantime" | 2.4 Search vendor "Leantime" for product "Leantime" and version "2.4" | beta2 |
Affected
| ||||||
Leantime Search vendor "Leantime" | Leantime Search vendor "Leantime" for product "Leantime" | 2.4 Search vendor "Leantime" for product "Leantime" and version "2.4" | beta3 |
Affected
|