Skip to content

Commit f73c9c9

Browse files
1 parent 39a7905 commit f73c9c9

File tree

4 files changed

+12
-8
lines changed

4 files changed

+12
-8
lines changed

advisories/github-reviewed/2024/03/GHSA-cj3c-5xpm-cx94/GHSA-cj3c-5xpm-cx94.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cj3c-5xpm-cx94",
4-
"modified": "2024-03-29T19:05:49Z",
4+
"modified": "2025-10-13T15:42:26Z",
55
"published": "2024-03-29T19:05:49Z",
66
"aliases": [
77
"CVE-2024-29200"
88
],
99
"summary": "Kimai API returns timesheet entries a user should not be authorized to view",
10-
"details": "### Summary\nThe permission `view_other_timesheet` performs differently for the Kimai UI and the API, thus returning unexpected data through the API.\n\n### Details\nWhen setting the `view_other_timesheet` permission to true, on the frontend, users can only see timesheet entries for teams they are a part of. When requesting all timesheets from the API, however, all timesheet entries are returned, regardless of whether the user shares team permissions or not.\n\nExample:\nThere are projects P1 and P2, Teams T1 and T2, users U1 and U2 and Timesheet entries E1 and E2. U1 is team leader of team T1 and has access to P1. U2 is in Team T2 and has access to both P1 and P2. U2 creates E1 for P1 and E2 for P2.\nIn the UI, U1 with `view _other_timesheet` perms sees E1 as he is a part of T1 that has access to P1.\nIn the API, however, he has access to E1 **and E2**.\n\nAdditionally, if U1 is not a team leader T1, he does not see any timesheet from a user other than himself in the UI, but still all timesheets in the API.\n\n### PoC\n- Give a user `view_other_timesheet` permission\n- The result of the UI and the API call to `/api/timesheets?user=all` differs in the data that is being returned\n\nCurl command:\n```bash\ncurl -X 'GET' \\\n 'https://kimai.instance.com/api/timesheets?user=all' \\\n -H 'accept: application/json' \\\n -H 'X-AUTH-USER: username' \\\n -H 'X-AUTH-TOKEN: api_token'\n ```\n\n### Impact\nThis is at least an insufficient granularity of access control weakness. People can see timesheet entries they are not supposed to.\nThis greatly affects the confidentiality of timesheet entries. \n\nRestricting API access to administrators is also not a valid solution, as API access is needed, for example, to use the mobile app.\n",
10+
"details": "### Summary\nThe permission `view_other_timesheet` performs differently for the Kimai UI and the API, thus returning unexpected data through the API.\n\n### Details\nWhen setting the `view_other_timesheet` permission to true, on the frontend, users can only see timesheet entries for teams they are a part of. When requesting all timesheets from the API, however, all timesheet entries are returned, regardless of whether the user shares team permissions or not.\n\nExample:\nThere are projects P1 and P2, Teams T1 and T2, users U1 and U2 and Timesheet entries E1 and E2. U1 is team leader of team T1 and has access to P1. U2 is in Team T2 and has access to both P1 and P2. U2 creates E1 for P1 and E2 for P2.\nIn the UI, U1 with `view _other_timesheet` perms sees E1 as he is a part of T1 that has access to P1.\nIn the API, however, he has access to E1 **and E2**.\n\nAdditionally, if U1 is not a team leader T1, he does not see any timesheet from a user other than himself in the UI, but still all timesheets in the API.\n\n### PoC\n- Give a user `view_other_timesheet` permission\n- The result of the UI and the API call to `/api/timesheets?user=all` differs in the data that is being returned\n\nCurl command:\n```bash\ncurl -X 'GET' \\\n 'https://kimai.instance.com/api/timesheets?user=all' \\\n -H 'accept: application/json' \\\n -H 'X-AUTH-USER: username' \\\n -H 'X-AUTH-TOKEN: api_token'\n ```\n\n### Impact\nThis is at least an insufficient granularity of access control weakness. People can see timesheet entries they are not supposed to.\nThis greatly affects the confidentiality of timesheet entries. \n\nRestricting API access to administrators is also not a valid solution, as API access is needed, for example, to use the mobile app.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

advisories/github-reviewed/2024/03/GHSA-vm8q-m57g-pff3/GHSA-vm8q-m57g-pff3.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vm8q-m57g-pff3",
4-
"modified": "2024-07-03T21:24:21Z",
4+
"modified": "2025-10-13T15:42:12Z",
55
"published": "2024-03-15T21:30:43Z",
66
"aliases": [
77
"CVE-2024-27351"
@@ -18,7 +18,7 @@
1818
{
1919
"package": {
2020
"ecosystem": "PyPI",
21-
"name": "django"
21+
"name": "Django"
2222
},
2323
"ranges": [
2424
{
@@ -37,7 +37,7 @@
3737
{
3838
"package": {
3939
"ecosystem": "PyPI",
40-
"name": "django"
40+
"name": "Django"
4141
},
4242
"ranges": [
4343
{
@@ -56,7 +56,7 @@
5656
{
5757
"package": {
5858
"ecosystem": "PyPI",
59-
"name": "django"
59+
"name": "Django"
6060
},
6161
"ranges": [
6262
{

advisories/github-reviewed/2024/05/GHSA-6f3v-2r2j-2rpr/GHSA-6f3v-2r2j-2rpr.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6f3v-2r2j-2rpr",
4-
"modified": "2024-05-07T19:59:29Z",
4+
"modified": "2025-10-13T15:43:47Z",
55
"published": "2024-05-07T18:30:33Z",
66
"aliases": [
77
"CVE-2024-4596"

advisories/github-reviewed/2025/02/GHSA-7g2v-jj9q-g3rg/GHSA-7g2v-jj9q-g3rg.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7g2v-jj9q-g3rg",
4-
"modified": "2025-02-18T15:04:49Z",
4+
"modified": "2025-10-13T15:44:33Z",
55
"published": "2025-02-12T19:18:35Z",
66
"aliases": [
77
"CVE-2025-25184"
88
],
99
"summary": "Possible Log Injection in Rack::CommonLogger",
1010
"details": "## Summary\n\n`Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs.\n\n## Details\n\nWhen a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes.\n\nThe issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile.\n\n## Impact\n\nAttackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files.\n\n## Mitigation\n\n- Update to the latest version of Rack.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"

0 commit comments

Comments
 (0)