<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SourceForge — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/sourceforge/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 19:20:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/sourceforge/feed.xml" rel="self" type="application/rss+xml"/><item><title>PHP Timeclock 1.04 Unauthenticated SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-php-timeclock-sqli/</link><pubDate>Fri, 15 May 2026 19:20:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-php-timeclock-sqli/</guid><description>PHP Timeclock 1.04 is vulnerable to time-based and boolean-based blind SQL injection in the login_userid parameter of login.php, allowing unauthenticated attackers to extract sensitive database information by sending crafted POST requests with SQL payloads.</description><content:encoded><![CDATA[<p>PHP Timeclock 1.04 is susceptible to SQL injection vulnerabilities, specifically time-based and boolean-based blind SQL injection. The vulnerability resides in the <code>login_userid</code> parameter of the <code>login.php</code> script. Unauthenticated attackers can exploit this flaw by injecting malicious SQL code into the vulnerable parameter, enabling them to extract sensitive information from the database. This includes employee names and credentials, potentially leading to unauthorized access and data breaches. The attack involves crafting specific POST requests containing SQL payloads designed to leverage <code>SLEEP</code> functions or <code>RLIKE</code> conditional statements to infer database contents.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the login form at <code>login.php</code>.</li>
<li>The attacker crafts a malicious POST request targeting the <code>login_userid</code> parameter.</li>
<li>The POST request contains a SQL payload designed to exploit the blind SQL injection vulnerability, using <code>SLEEP</code> functions (time-based) or <code>RLIKE</code> conditional statements (boolean-based).</li>
<li>The server processes the SQL payload within the <code>login_userid</code> parameter.</li>
<li>Based on the response time (time-based) or the boolean result (boolean-based), the attacker infers information about the database structure and contents.</li>
<li>The attacker iteratively refines the SQL payloads to extract more data.</li>
<li>Sensitive information, such as employee usernames and passwords, is extracted from the database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows attackers to extract sensitive database information, including employee credentials and personal data. This can lead to unauthorized access to the system, data breaches, and potential compromise of employee accounts. The vulnerability affects PHP Timeclock 1.04, potentially impacting any organization using this software to manage employee time tracking. The CVSS v3.1 base score is 8.2, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a secure version of PHP Timeclock to remediate CVE-2021-47966.</li>
<li>Deploy the Sigma rule to detect SQL injection attempts against the <code>login_userid</code> parameter in <code>login.php</code>.</li>
<li>Monitor web server logs for suspicious POST requests containing SQL syntax, specifically <code>SLEEP</code> and <code>RLIKE</code> functions.</li>
<li>Implement input validation and sanitization on the <code>login_userid</code> parameter to prevent SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>php</category></item></channel></rss>