CVE-2023-45826

Severity CVSS v4.0:
Pending analysis
Type:
CWE-89 SQL Injection
Publication date:
19/10/2023
Last modified:
27/10/2023

Description

Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:leantime:leantime:*:*:*:*:*:*:*:* 2.4 (excluding)
cpe:2.3:a:leantime:leantime:2.4:-:*:*:*:*:*:*
cpe:2.3:a:leantime:leantime:2.4:beta:*:*:*:*:*:*
cpe:2.3:a:leantime:leantime:2.4:beta2:*:*:*:*:*:*
cpe:2.3:a:leantime:leantime:2.4:beta3:*:*:*:*:*:*