Description
PHP Timeclock 1.04 contains multiple cross-site scripting vulnerabilities that allow unauthenticated attackers to inject arbitrary JavaScript by manipulating URL paths and POST parameters. Attackers can append malicious payloads to login.php, timeclock.php, audit.php, and timerpt.php endpoints, or inject code through from_date and to_date parameters in report requests to execute scripts in user browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Tyler Butler
References
www.exploit-db.com/exploits/49853 (ExploitDB-49853)
timeclock.sourceforge.net (Official Product Homepage)
sourceforge.net/...k/files/PHP Timeclock/PHP Timeclock 1.04/ (Product Reference)
www.vulncheck.com/...ple-cross-site-scripting-via-parameters (VulnCheck Advisory: PHP Timeclock 1.04 Multiple Cross-Site Scripting via Parameters)