vendor:
TimeClock Software
by:
François Bibeau and Tyler Butler
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: TimeClock Software
Affected Version From: 1.01
Affected Version To: 1.01
Patch Exists: NO
Related CWE: N/A
CPE: a:timeclock_software:timeclock_software:1.01
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 18.04.3 (LTS) x64, mysql 5.7, php 7.2.1-apache
2020
TimeClock Software 1.01 Authenticated Time-Based SQL Injection
TimeClock Software 1.01 is vulnerable to an authenticated time-based SQL injection vulnerability. This vulnerability allows an attacker to enumerate valid usernames from the application's database. The exploit is achieved by sending a specially crafted HTTP POST request to the add_entry.php page with a malicious payload in the 'notes' parameter. If the username is valid, the application will delay its response for 5 seconds, allowing the attacker to detect the valid username.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in SQL queries.