Server-side Request Forgery (SSRF) Affecting timetagger package, versions [,24.12.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-TIMETAGGER-8601498
  • published2 Jan 2025
  • disclosed1 Jan 2025
  • creditUnknown

Introduced: 1 Jan 2025

New CVE NOT AVAILABLE CWE-918  (opens in a new tab)

How to fix?

Upgrade timetagger to version 24.12.2 or higher.

Overview

timetagger is a Tag your time, get the insight - an open source time tracker for individuals

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to binding to 0.0.0.0:80 by default and not checking for localhost requests in the get_webtoken_localhost() function. This allows attackers to spoof internal requests if the server is exposed to the Internet.

CVSS Scores

version 4.0
version 3.1