CVE-2023-32306
📋 TL;DR
CVE-2023-32306 is a time-based blind SQL injection vulnerability in Time Tracker's reports.php page that allows attackers to execute arbitrary SQL queries against the database. This affects all Time Tracker installations running versions before 1.22.13.5792. Attackers can potentially extract, modify, or delete sensitive time tracking data.
💻 Affected Systems
- Time Tracker
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover via subsequent attacks.
Likely Case
Unauthorized access to sensitive time tracking data, employee information, and potential privilege escalation.
If Mitigated
Limited impact with proper input validation, parameterized queries, and database permission restrictions.
🎯 Exploit Status
SQL injection vulnerabilities are commonly weaponized. Exploitation requires POST requests to reports.php with malicious parameters.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.22.13.5792
Vendor Advisory: https://github.com/anuko/timetracker/security/advisories/GHSA-758x-vg7g-j9j3
Restart Required: No
Instructions:
1. Backup your Time Tracker installation and database. 2. Download version 1.22.13.5792 or later from the official repository. 3. Replace the existing installation with the updated version. 4. Verify that reports.php now properly validates all POST parameters.
🔧 Temporary Workarounds
Manual code fix
allReplace the vulnerable ttReportHelper.class.php file with the fixed version from 1.22.13.5792
cp /path/to/fixed/ttReportHelper.class.php /path/to/timetracker/ttReportHelper.class.php
🧯 If You Can't Patch
- Implement a web application firewall (WAF) with SQL injection rules
- Restrict access to reports.php page to authorized users only
🔍 How to Verify
Check if Vulnerable:
Check if your Time Tracker version is below 1.22.13.5792 and review if reports.php validates all POST parameters.
Check Version:
Check the version.php file or admin interface for version information
Verify Fix Applied:
Verify the installation is version 1.22.13.5792 or higher and test that reports.php properly sanitizes input.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to reports.php with SQL keywords
- Multiple failed login attempts followed by reports.php access
Network Indicators:
- POST requests to reports.php containing SQL syntax like UNION, SELECT, INSERT
SIEM Query:
source="web_logs" AND uri="/reports.php" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "INSERT")