Skip to content

Authenticated Blind SQL Injection

High
marcelfolaron published GHSA-ww6x-rhvp-55hp Mar 27, 2020

Package

class.tickets.php (Leantime)

Affected versions

all versions <= 2.0.14 & 2.1-beta2

Patched versions

2.0.15 & 2.1-beta3

Description

Vulnerability type

Authenticated Blind SQL Injection

Impact & Description

The impact is high. Malicious users/attackers can execute arbitrary SQL queries negatively affecting the confidentiality, integrity, and availability of the site. Attackers can exfiltrate data like the users' and administrators' password hashes, modify data, or drop tables. The unescaped parameter is "searchUsers" when sending a POST request to "/tickets/showKanban" with a valid session. In the code, the parameter is named "users" in class.tickets.php.

Patches

2.0.15 or 2.1.0 beta 3

References

To-Do searches didn't escape the "users" parameter correctly. All values are now escaped.

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2020-5292

Weaknesses

No CWEs

Credits