CVE-2022-24708

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24708
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24708.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24708
Aliases
  • GHSA-rgcm-xgvj-5mqh
Published
2022-02-23T23:50:09Z
Modified
2025-11-04T19:32:40Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L CVSS Calculator
Summary
Stored XSS vulnerability in anuko/timetracker
Details

Anuko Time Tracker is an open source, web-based time tracking application written in PHP. ttUser.class.php in Time Tracker versions prior to 1.20.0.5646 was not escaping primary group name for display. Because of that, it was possible for a logged in user to modify primary group name with elements of JavaScript. Such script could then be executed in user browser on subsequent requests on pages where primary group name was displayed. This is vulnerability has been fixed in version 1.20.0.5646. Users who are unable to upgrade may modify ttUser.class.php to use an additional call to htmlspecialchars when printing group name.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/anuko/timetracker

Affected ranges

Type
GIT
Repo
https://github.com/anuko/timetracker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed