Titra API Contains Mass Assignment Vulnerability
Description
Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.
Affected products
1- Range: 0.1.0, 0.10.0, 0.11.0, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/kromitgmbh/titra/commit/29e6b88eca005107729e45a6f1731cf0fa5f8938mitrex_refsource_MISC
- github.com/kromitgmbh/titra/security/advisories/GHSA-gc65-vr47-jppqmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.