{"vulnerability": "CVE-2023-32308", "sightings": [{"uuid": "253c06c1-480b-4967-beba-e3d5cb19e22f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32308", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2668", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32308\n\ud83d\udd39 Description: anuko timetracker is an open source time tracking system. Boolean-based blind SQL injection vulnerability existed in Time Tracker invoices.php in versions prior to 1.22.11.5781. This was happening because of a coding error after validating parameters in POST requests. There was no check for errors before adjusting invoice sorting order. Because of this, it was possible to craft a POST request with malicious SQL for Time Tracker database. This issue has been fixed in version 1.22.11.5781. Users are advised to upgrade. Users unable to upgrade may insert an additional check for errors in a condition before calling `ttGroupHelper::getActiveInvoices()` in invoices.php.\n\ud83d\udccf Published: 2023-05-15T20:47:06.537Z\n\ud83d\udccf Modified: 2025-01-22T21:40:50.490Z\n\ud83d\udd17 References:\n1. https://github.com/anuko/timetracker/security/advisories/GHSA-9g2c-7c7g-p58r\n2. https://github.com/anuko/timetracker/commit/8a7367d7f77ea697c090f5ca4e19669181cc7bcf", "creation_timestamp": "2025-01-22T22:02:33.000000Z"}]}