Impact
Cross site request forgery (CSRF) vulnerability existed in Time Tracker versions below 1.19.27.5431. The nature of CSRF is that a logged on user may be tricked by social engineering to click on an attacker-provided form that executes an unintended action such as changing user password.
Patches
The vulnerability is fixed in Time Tracker version 1.19.27.5431.
Workarounds
Upgrade is recommended. If upgrade is not practical, introduce ttMitigateCSRF() function in /WEB-INF/lib/common.php.lib using the latest available code and call it from ttAccessAllowed().
References
More information and example workaround code is available at https://www.anuko.com/time-tracker/news/cross-site-request-forgery-vulnerability.htm
For more information
If you have any questions or comments about this advisory:
Impact
Cross site request forgery (CSRF) vulnerability existed in Time Tracker versions below 1.19.27.5431. The nature of CSRF is that a logged on user may be tricked by social engineering to click on an attacker-provided form that executes an unintended action such as changing user password.
Patches
The vulnerability is fixed in Time Tracker version 1.19.27.5431.
Workarounds
Upgrade is recommended. If upgrade is not practical, introduce ttMitigateCSRF() function in /WEB-INF/lib/common.php.lib using the latest available code and call it from ttAccessAllowed().
References
More information and example workaround code is available at https://www.anuko.com/time-tracker/news/cross-site-request-forgery-vulnerability.htm
For more information
If you have any questions or comments about this advisory: