CVE-2021-29436
low-risk
Published 2021-04-13
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In Time Tracker before version 1.19.27.5431 a Cross site request forgery (CSRF) vulnerability existed. The nature of CSRF is that a logged on user may be tricked by social engineering to click on an attacker-provided form that executes an unintended action such as changing user password. The vulnerability is fixed in Time Tracker version 1.19.27.5431. Upgrade is recommended. If upgrade is not practical, introduce ttMitigateCSRF() function in /WEB-INF/lib/common.php.lib using the latest available code and call it from ttAccessAllowed().
Do I need to act?
-
0.22% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.4/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Time Tracker
Affected Vendors
References (6)
Third Party Advisory
https://github.com/anuko/timetracker/security/advisories/GHSA-pgpx-rfvj-9g4f
Third Party Advisory
https://github.com/anuko/timetracker/security/advisories/GHSA-pgpx-rfvj-9g4f
27
/ 100
low-risk
Severity
21/34 · High
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal