CVE-2020-27422

9.8 CRITICAL

📋 TL;DR

This vulnerability in Anuko Time Tracker allows attackers to reuse password reset links after they've already been used, enabling account takeover. It affects all users of the vulnerable version who request password resets. The flaw exists in the password reset mechanism's failure to invalidate used tokens.

💻 Affected Systems

Products:
  • Anuko Time Tracker
Versions: v1.19.23.5311
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of this specific version regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover by any attacker who intercepts or guesses a password reset link, leading to unauthorized access, data theft, and potential privilege escalation.

🟠

Likely Case

Account compromise for users who have recently requested password resets, allowing attackers to access sensitive time tracking data and potentially modify records.

🟢

If Mitigated

Limited impact with proper monitoring and quick response to suspicious account activity, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires intercepting or guessing password reset links, which can be done via network sniffing, email compromise, or brute force.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.19.23.5312 or later

Vendor Advisory: https://www.anuko.com/time-tracker/index.htm

Restart Required: No

Instructions:

1. Download latest version from Anuko website. 2. Backup current installation. 3. Replace files with patched version. 4. Verify password reset functionality.

🔧 Temporary Workarounds

Disable Password Reset

all

Temporarily disable password reset functionality to prevent exploitation.

Modify configuration to remove password reset option

🧯 If You Can't Patch

  • Implement rate limiting on password reset requests
  • Monitor logs for multiple password reset attempts on same account

🔍 How to Verify

Check if Vulnerable:

Test password reset functionality: use a reset link, then attempt to use same link again. If it works, system is vulnerable.

Check Version:

Check version in application interface or configuration files

Verify Fix Applied:

After patching, test password reset: used links should be invalidated and return error.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful password resets for same user in short time
  • Password reset requests from unusual IP addresses

Network Indicators:

  • Unusual patterns of password reset email requests

SIEM Query:

source="time_tracker" AND (event="password_reset" AND count>2 per user per hour)

🔗 References

📤 Share & Export