CVE-2021-21352

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-21352
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-21352.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-21352
Related
  • GHSA-43c9-rx4h-4gqq
Published
2021-03-03T01:15:13Z
Modified
2025-10-21T02:36:28Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In TimeTracker before version 1.19.24.5415 tokens used in password reset feature in Time Tracker are based on system time and, therefore, are predictable. This opens a window for brute force attacks to guess user tokens and, once successful, change user passwords, including that of a system administrator. This vulnerability is pathced in version 1.19.24.5415 (started to use more secure tokens) with an additional improvement in 1.19.24.5416 (limited an available window for brute force token guessing).

References

Affected packages

Git / github.com/anuko/timetracker

Affected ranges

Type
GIT
Repo
https://github.com/anuko/timetracker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed