PHP Timeclock 1.04 contains time-based and boolean-based blind SQL injection vulnerabilities in the login_userid parameter of login.php that allows unauthenticated attackers to extract database contents. Attackers can submit crafted POST requests with SQL payloads using SLEEP functions or RLIKE conditional statements to dump sensitive database information including employee names and credentials.
Metrics
Affected Vendors & Products
References
History
Fri, 15 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PHP Timeclock 1.04 contains time-based and boolean-based blind SQL injection vulnerabilities in the login_userid parameter of login.php that allows unauthenticated attackers to extract database contents. Attackers can submit crafted POST requests with SQL payloads using SLEEP functions or RLIKE conditional statements to dump sensitive database information including employee names and credentials. | |
| Title | PHP Timeclock 1.04 SQL Injection via login.php | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T22:22:09.612Z
Reserved: 2026-05-15T16:36:50.147Z
Link: CVE-2021-47966
Updated: 2026-05-15T22:12:26.773Z
Status : Received
Published: 2026-05-15T19:16:56.293
Modified: 2026-05-15T19:16:56.293
Link: CVE-2021-47966
No data.
OpenCVE Enrichment
Updated: 2026-05-15T20:30:06Z