All the vulnerabilites related to kanboard - kanboard
cve-2017-15195
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 20:42
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit swimlanes of a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit swimlanes of a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit swimlanes of a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15195", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T20:42:52.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15208
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 22:02
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can remove automatic actions from a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:15.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can remove automatic actions from a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15208", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can remove automatic actions from a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15208", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T22:02:12.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36813
Vulnerability from cvelistv5
Published
2023-07-05 21:05
Modified
2024-10-18 19:23
Severity ?
EPSS score ?
Summary
Kanboard is project management software that focuses on the Kanban methodology. In versions prior to 1.2.31authenticated user is able to perform a SQL Injection, leading to a privilege escalation or loss of confidentiality. It appears that in some insert and update operations, the code improperly uses the PicoDB library to update/insert new information. Version 1.2.31 contains a fix for this issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:01:09.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx" }, { "name": "https://github.com/kanboard/kanboard/commit/25b93343baeaf8ad018dcd87b094e47a5c6a3e0a", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/25b93343baeaf8ad018dcd87b094e47a5c6a3e0a" }, { "name": "https://github.com/kanboard/kanboard/releases/tag/v1.2.31", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/releases/tag/v1.2.31" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5454" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "kanboard", "vendor": "kanboard", "versions": [ { "lessThan": "1.2.31", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-36813", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T19:03:17.863218Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T19:23:45.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.31" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is project management software that focuses on the Kanban methodology. In versions prior to 1.2.31authenticated user is able to perform a SQL Injection, leading to a privilege escalation or loss of confidentiality. It appears that in some insert and update operations, the code improperly uses the PicoDB library to update/insert new information. Version 1.2.31 contains a fix for this issue.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T21:05:53.347Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx" }, { "name": "https://github.com/kanboard/kanboard/commit/25b93343baeaf8ad018dcd87b094e47a5c6a3e0a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/25b93343baeaf8ad018dcd87b094e47a5c6a3e0a" }, { "name": "https://github.com/kanboard/kanboard/releases/tag/v1.2.31", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/releases/tag/v1.2.31" }, { "url": "https://www.debian.org/security/2023/dsa-5454" } ], "source": { "advisory": "GHSA-9gvq-78jp-jxcx", "discovery": "UNKNOWN" }, "title": "Kanboard Authenticated SQL Injections vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36813", "datePublished": "2023-07-05T21:05:53.347Z", "dateReserved": "2023-06-27T15:43:18.383Z", "dateUpdated": "2024-10-18T19:23:45.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15198
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 16:54
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit a category of a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit a category of a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15198", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit a category of a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15198", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T16:54:12.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15206
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-17 02:20
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can add an internal link to a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:15.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add an internal link to a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15206", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add an internal link to a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15206", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-17T02:20:49.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-55603
Vulnerability from cvelistv5
Published
2024-12-18 23:52
Modified
2024-12-20 20:12
Severity ?
EPSS score ?
Summary
Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (`app/Core/Session/SessionHandler.php`), to store the session data in a database. Therefore, when a `session_id` is given, kanboard queries the data from the `sessions` sql table. At this point, it does not correctly verify, if a given `session_id` has already exceeded its lifetime (`expires_at`).
Thus, a session which's lifetime is already `> time()`, is still queried from the database and hence a valid login. The implemented **SessionHandlerInterface::gc** function, that does remove invalid sessions, is called only **with a certain probability** (_Cleans up expired sessions. Called by `session_start()`, based on `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` settings_) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gc_probability=1, session.gc_divisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55603", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-20T20:10:11.562584Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-20T20:12:10.648Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.43" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (`app/Core/Session/SessionHandler.php`), to store the session data in a database. Therefore, when a `session_id` is given, kanboard queries the data from the `sessions` sql table. At this point, it does not correctly verify, if a given `session_id` has already exceeded its lifetime (`expires_at`).\nThus, a session which\u0027s lifetime is already `\u003e time()`, is still queried from the database and hence a valid login. The implemented **SessionHandlerInterface::gc** function, that does remove invalid sessions, is called only **with a certain probability** (_Cleans up expired sessions. Called by `session_start()`, based on `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` settings_) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gc_probability=1, session.gc_divisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613: Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-18T23:52:57.327Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gv5c-8pxr-p484", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gv5c-8pxr-p484" }, { "name": "https://github.com/kanboard/kanboard/commit/7ce61c34d962ca8b5dce776289ddf4b207be6e78", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/7ce61c34d962ca8b5dce776289ddf4b207be6e78" }, { "name": "https://github.com/kanboard/kanboard/blob/main/app/Core/Session/SessionHandler.php#L40", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/blob/main/app/Core/Session/SessionHandler.php#L40" }, { "name": "https://www.php.net/manual/en/function.session-start.php", "tags": [ "x_refsource_MISC" ], "url": "https://www.php.net/manual/en/function.session-start.php" }, { "name": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-divisor", "tags": [ "x_refsource_MISC" ], "url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-divisor" }, { "name": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-maxlifetime", "tags": [ "x_refsource_MISC" ], "url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-maxlifetime" }, { "name": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-probability", "tags": [ "x_refsource_MISC" ], "url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-probability" }, { "name": "https://www.php.net/manual/en/sessionhandlerinterface.gc.php", "tags": [ "x_refsource_MISC" ], "url": "https://www.php.net/manual/en/sessionhandlerinterface.gc.php" } ], "source": { "advisory": "GHSA-gv5c-8pxr-p484", "discovery": "UNKNOWN" }, "title": "Insufficient session invalidation in Kanboard" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-55603", "datePublished": "2024-12-18T23:52:57.327Z", "dateReserved": "2024-12-09T14:22:52.524Z", "dateUpdated": "2024-12-20T20:12:10.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7324
Vulnerability from cvelistv5
Published
2019-02-04 19:00
Modified
2024-08-04 20:46
Severity ?
EPSS score ?
Summary
app/Core/Paginator.php in Kanboard before 1.2.8 has XSS in pagination sorting.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/83deec2e3621c40d15a06e2491f27571d32fe10f | x_refsource_MISC | |
https://github.com/kanboard/kanboard/releases/tag/v1.2.8 | x_refsource_MISC | |
http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2019/May/41 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:46:46.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/83deec2e3621c40d15a06e2491f27571d32fe10f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/releases/tag/v1.2.8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html" }, { "name": "20190529 Reflected Cross-site Scripting Vulnerability in Kanboard 1.2.7", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/May/41" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "app/Core/Paginator.php in Kanboard before 1.2.8 has XSS in pagination sorting." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-30T03:06:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/83deec2e3621c40d15a06e2491f27571d32fe10f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/releases/tag/v1.2.8" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html" }, { "name": "20190529 Reflected Cross-site Scripting Vulnerability in Kanboard 1.2.7", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/May/41" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7324", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "app/Core/Paginator.php in Kanboard before 1.2.8 has XSS in pagination sorting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/83deec2e3621c40d15a06e2491f27571d32fe10f", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/83deec2e3621c40d15a06e2491f27571d32fe10f" }, { "name": "https://github.com/kanboard/kanboard/releases/tag/v1.2.8", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/releases/tag/v1.2.8" }, { "name": "http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html" }, { "name": "20190529 Reflected Cross-site Scripting Vulnerability in Kanboard 1.2.7", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/May/41" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-7324", "datePublished": "2019-02-04T19:00:00", "dateReserved": "2019-02-04T00:00:00", "dateUpdated": "2024-08-04T20:46:46.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33968
Vulnerability from cvelistv5
Published
2023-06-05 19:49
Modified
2024-08-02 15:54
Severity ?
EPSS score ?
Summary
Kanboard is open source project management software that focuses on the Kanban methodology. Versions prior to 1.2.30 are subject to a missing access control vulnerability that allows a user with low privileges to create or transfer tasks to any project within the software, even if they have not been invited or the project is personal. The vulnerable features are `Duplicate to project` and `Move to project`, which both utilize the `checkDestinationProjectValues()` function to check his values. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr | x_refsource_CONFIRM | |
https://github.com/kanboard/kanboard/commit/c20be8f5fa26e54005a90c645e80b11481a65053 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:54:14.206Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr" }, { "name": "https://github.com/kanboard/kanboard/commit/c20be8f5fa26e54005a90c645e80b11481a65053", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/c20be8f5fa26e54005a90c645e80b11481a65053" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.30" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is open source project management software that focuses on the Kanban methodology. Versions prior to 1.2.30 are subject to a missing access control vulnerability that allows a user with low privileges to create or transfer tasks to any project within the software, even if they have not been invited or the project is personal. The vulnerable features are `Duplicate to project` and `Move to project`, which both utilize the `checkDestinationProjectValues()` function to check his values. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T19:49:17.550Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr" }, { "name": "https://github.com/kanboard/kanboard/commit/c20be8f5fa26e54005a90c645e80b11481a65053", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/c20be8f5fa26e54005a90c645e80b11481a65053" } ], "source": { "advisory": "GHSA-gf8r-4p6m-v8vr", "discovery": "UNKNOWN" }, "title": "Missing Access Control allows User to move and duplicate tasks in Kanboard" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-33968", "datePublished": "2023-06-05T19:49:17.550Z", "dateReserved": "2023-05-24T13:46:35.953Z", "dateUpdated": "2024-08-02T15:54:14.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15199
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 19:09
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit metadata of a private project of another user, as demonstrated by Name, Email, Identifier, and Description.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit metadata of a private project of another user, as demonstrated by Name, Email, Identifier, and Description." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15199", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit metadata of a private project of another user, as demonstrated by Name, Email, Identifier, and Description." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15199", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T19:09:17.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3920
Vulnerability from cvelistv5
Published
2014-07-03 14:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in Kanboard before 1.0.6 allows remote attackers to hijack the authentication of administrators for requests that add an administrative user via a save action to the default URI.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/532619/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://kanboard.net/news | x_refsource_CONFIRM | |
https://www.htbridge.com/advisory/HTB23217 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:57:18.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140702 Cross-Site Request Forgery (CSRF) in Kanboard", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532619/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kanboard.net/news" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.com/advisory/HTB23217" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Kanboard before 1.0.6 allows remote attackers to hijack the authentication of administrators for requests that add an administrative user via a save action to the default URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140702 Cross-Site Request Forgery (CSRF) in Kanboard", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532619/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kanboard.net/news" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.com/advisory/HTB23217" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3920", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in Kanboard before 1.0.6 allows remote attackers to hijack the authentication of administrators for requests that add an administrative user via a save action to the default URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140702 Cross-Site Request Forgery (CSRF) in Kanboard", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/532619/100/0/threaded" }, { "name": "http://kanboard.net/news", "refsource": "CONFIRM", "url": "http://kanboard.net/news" }, { "name": "https://www.htbridge.com/advisory/HTB23217", "refsource": "MISC", "url": "https://www.htbridge.com/advisory/HTB23217" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-3920", "datePublished": "2014-07-03T14:00:00", "dateReserved": "2014-05-29T00:00:00", "dateUpdated": "2024-08-06T10:57:18.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15207
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 16:48
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tasks of a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:15.770Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tasks of a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15207", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tasks of a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15207", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T16:48:23.001Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15211
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 18:33
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can add an external link to a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add an external link to a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15211", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add an external link to a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15211", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T18:33:26.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15212
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 20:01
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can at least see the names of tags of a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can at least see the names of tags of a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15212", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can at least see the names of tags of a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15212", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T20:01:48.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54001
Vulnerability from cvelistv5
Published
2024-12-05 15:17
Modified
2024-12-05 16:41
Severity ?
EPSS score ?
Summary
Kanboard is project management software that focuses on the Kanban methodology. HTML can be injected and stored into the application settings section. The fields application_language, application_date_format,application_timezone and application_time_format allow arbirary user input which is reflected. The vulnerability can become xss if the user input is javascript code that bypass CSP. This vulnerability is fixed in 1.2.41.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-4vvp-jf72-chrj | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "kanboard", "vendor": "kanboard", "versions": [ { "lessThan": "1.2.41", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-54001", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T16:40:28.043861Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T16:41:45.720Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.41" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is project management software that focuses on the Kanban methodology. HTML can be injected and stored into the application settings section. The fields application_language, application_date_format,application_timezone and application_time_format allow arbirary user input which is reflected. The vulnerability can become xss if the user input is javascript code that bypass CSP. This vulnerability is fixed in 1.2.41." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T15:17:47.891Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-4vvp-jf72-chrj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-4vvp-jf72-chrj" } ], "source": { "advisory": "GHSA-4vvp-jf72-chrj", "discovery": "UNKNOWN" }, "title": "Kanboard allows a persistent HTML injection site scripting in settings page date format" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-54001", "datePublished": "2024-12-05T15:17:47.891Z", "dateReserved": "2024-11-25T23:14:36.384Z", "dateUpdated": "2024-12-05T16:41:45.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15196
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 16:39
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can remove columns from a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:15.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can remove columns from a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can remove columns from a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15196", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T16:39:06.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32685
Vulnerability from cvelistv5
Published
2023-05-30 04:11
Modified
2024-08-02 15:25
Severity ?
EPSS score ?
Summary
Kanboard is project management software that focuses on the Kanban methodology. Due to improper handling of elements under the `contentEditable` element, maliciously crafted clipboard content can inject arbitrary HTML tags into the DOM. A low-privileged attacker with permission to attach a document on a vulnerable Kanboard instance can trick the victim into pasting malicious screenshot data and achieve cross-site scripting if CSP is improperly configured. This issue has been patched in version 1.2.29.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-hjmw-gm82-r4gv | x_refsource_CONFIRM | |
https://github.com/kanboard/kanboard/commit/26b6eebb78d4306e48b836a58f7c386251aa2bc7 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/c9c187206700030c43493b80fd599b4d096cb713 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-hjmw-gm82-r4gv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-hjmw-gm82-r4gv" }, { "name": "https://github.com/kanboard/kanboard/commit/26b6eebb78d4306e48b836a58f7c386251aa2bc7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/26b6eebb78d4306e48b836a58f7c386251aa2bc7" }, { "name": "https://github.com/kanboard/kanboard/commit/c9c187206700030c43493b80fd599b4d096cb713", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/c9c187206700030c43493b80fd599b4d096cb713" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.29" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is project management software that focuses on the Kanban methodology. Due to improper handling of elements under the `contentEditable` element, maliciously crafted clipboard content can inject arbitrary HTML tags into the DOM. A low-privileged attacker with permission to attach a document on a vulnerable Kanboard instance can trick the victim into pasting malicious screenshot data and achieve cross-site scripting if CSP is improperly configured. This issue has been patched in version 1.2.29.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-30T04:11:50.569Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-hjmw-gm82-r4gv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-hjmw-gm82-r4gv" }, { "name": "https://github.com/kanboard/kanboard/commit/26b6eebb78d4306e48b836a58f7c386251aa2bc7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/26b6eebb78d4306e48b836a58f7c386251aa2bc7" }, { "name": "https://github.com/kanboard/kanboard/commit/c9c187206700030c43493b80fd599b4d096cb713", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/c9c187206700030c43493b80fd599b4d096cb713" } ], "source": { "advisory": "GHSA-hjmw-gm82-r4gv", "discovery": "UNKNOWN" }, "title": "Clipboard based cross-site scripting (blocked with default CSP) in Kanboard" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-32685", "datePublished": "2023-05-30T04:11:50.569Z", "dateReserved": "2023-05-11T16:33:45.732Z", "dateUpdated": "2024-08-02T15:25:36.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15200
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 20:27
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new task to a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new task to a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15200", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new task to a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15200", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T20:27:13.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51748
Vulnerability from cvelistv5
Published
2024-11-11 19:20
Modified
2024-11-12 14:44
Severity ?
EPSS score ?
Summary
Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can run arbitrary php code on the server in combination with a file write possibility. The user interface language is determined and loaded by the setting `application_language` in the `settings` table. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, has control over the filepath, which is loaded. Exploiting this vulnerability has one constraint: the attacker must be able to place a file (called translations.php) on the system. However, this is not impossible, think of anonymous FTP server or another application that allows uploading files. Once the attacker has placed its file with the actual php code as the payload, the attacker can craft a sqlite db settings, which uses path traversal to point to the directory, where the `translations.php` file is stored. Then gaining code execution after importing the crafted sqlite.db. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-jvff-x577-j95p | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "kanboard", "vendor": "kanboard", "versions": [ { "lessThan": "1.2.42", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-51748", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T14:42:48.932355Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T14:44:13.741Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.42" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can run arbitrary php code on the server in combination with a file write possibility. The user interface language is determined and loaded by the setting `application_language` in the `settings` table. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, has control over the filepath, which is loaded. Exploiting this vulnerability has one constraint: the attacker must be able to place a file (called translations.php) on the system. However, this is not impossible, think of anonymous FTP server or another application that allows uploading files. Once the attacker has placed its file with the actual php code as the payload, the attacker can craft a sqlite db settings, which uses path traversal to point to the directory, where the `translations.php` file is stored. Then gaining code execution after importing the crafted sqlite.db. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:20:29.400Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-jvff-x577-j95p", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-jvff-x577-j95p" } ], "source": { "advisory": "GHSA-jvff-x577-j95p", "discovery": "UNKNOWN" }, "title": "Remote code execution through language setting in kanboard" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51748", "datePublished": "2024-11-11T19:20:29.400Z", "dateReserved": "2024-10-31T14:12:45.790Z", "dateUpdated": "2024-11-12T14:44:13.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15210
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-17 01:07
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can see thumbnails of pictures from a private project of another user.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can see thumbnails of pictures from a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15210", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can see thumbnails of pictures from a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15210", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-17T01:07:02.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33969
Vulnerability from cvelistv5
Published
2023-06-05 19:57
Modified
2024-08-02 15:54
Severity ?
EPSS score ?
Summary
Kanboard is open source project management software that focuses on the Kanban methodology. A stored Cross site scripting (XSS) allows an attacker to execute arbitrary Javascript and any user who views the task containing the malicious code will be exposed to the XSS attack. Note: The default CSP header configuration blocks this javascript attack. This issue has been addressed in version 1.2.30. Users are advised to upgrade. Users unable to upgrade should ensure that they have a restrictive CSP header config.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9 | x_refsource_CONFIRM | |
https://github.com/kanboard/kanboard/commit/05f1d23d821152cd61536d3b09e522c0f7573e3c | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:54:14.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9" }, { "name": "https://github.com/kanboard/kanboard/commit/05f1d23d821152cd61536d3b09e522c0f7573e3c", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/05f1d23d821152cd61536d3b09e522c0f7573e3c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.30" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is open source project management software that focuses on the Kanban methodology. A stored Cross site scripting (XSS) allows an attacker to execute arbitrary Javascript and any user who views the task containing the malicious code will be exposed to the XSS attack. Note: The default CSP header configuration blocks this javascript attack. This issue has been addressed in version 1.2.30. Users are advised to upgrade. Users unable to upgrade should ensure that they have a restrictive CSP header config.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T19:57:11.800Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9" }, { "name": "https://github.com/kanboard/kanboard/commit/05f1d23d821152cd61536d3b09e522c0f7573e3c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/05f1d23d821152cd61536d3b09e522c0f7573e3c" } ], "source": { "advisory": "GHSA-8qvf-9847-gpc9", "discovery": "UNKNOWN" }, "title": "Stored Cross site scripting in the Task External Link Functionality in Kanboard" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-33969", "datePublished": "2023-06-05T19:57:11.800Z", "dateReserved": "2023-05-24T13:46:35.953Z", "dateUpdated": "2024-08-02T15:54:14.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33956
Vulnerability from cvelistv5
Published
2023-06-05 19:34
Modified
2024-08-02 15:54
Severity ?
EPSS score ?
Summary
Kanboard is open source project management software that focuses on the Kanban methodology. Versions prior to 1.2.30 are subject to an Insecure direct object reference (IDOR) vulnerability present in the application's URL parameter. This vulnerability enables any user to read files uploaded by any other user, regardless of their privileges or restrictions. By Changing the file_id any user can render all the files where MimeType is image uploaded under **/files** directory regard less of uploaded by any user. This vulnerability poses a significant impact and severity to the application's security. By manipulating the URL parameter, an attacker can access sensitive files that should only be available to authorized users. This includes confidential documents or any other type of file stored within the application. The ability to read these files can lead to various detrimental consequences, such as unauthorized disclosure of sensitive information, privacy breaches, intellectual property theft, or exposure of trade secrets. Additionally, it could result in legal and regulatory implications, reputation damage, financial losses, and potential compromise of user trust. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2 | x_refsource_CONFIRM | |
https://github.com/kanboard/kanboard/commit/437b141fa2267df36976814e704517f30d2424bd | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:54:14.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2" }, { "name": "https://github.com/kanboard/kanboard/commit/437b141fa2267df36976814e704517f30d2424bd", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/437b141fa2267df36976814e704517f30d2424bd" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.30" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is open source project management software that focuses on the Kanban methodology. Versions prior to 1.2.30 are subject to an Insecure direct object reference (IDOR) vulnerability present in the application\u0027s URL parameter. This vulnerability enables any user to read files uploaded by any other user, regardless of their privileges or restrictions. By Changing the file_id any user can render all the files where MimeType is image uploaded under **/files** directory regard less of uploaded by any user. This vulnerability poses a significant impact and severity to the application\u0027s security. By manipulating the URL parameter, an attacker can access sensitive files that should only be available to authorized users. This includes confidential documents or any other type of file stored within the application. The ability to read these files can lead to various detrimental consequences, such as unauthorized disclosure of sensitive information, privacy breaches, intellectual property theft, or exposure of trade secrets. Additionally, it could result in legal and regulatory implications, reputation damage, financial losses, and potential compromise of user trust. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T19:34:51.508Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2" }, { "name": "https://github.com/kanboard/kanboard/commit/437b141fa2267df36976814e704517f30d2424bd", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/437b141fa2267df36976814e704517f30d2424bd" } ], "source": { "advisory": "GHSA-r36m-44gg-wxg2", "discovery": "UNKNOWN" }, "title": "Parameter based Indirect Object Referencing leading to private file exposure in Kanboard" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-33956", "datePublished": "2023-06-05T19:34:51.508Z", "dateReserved": "2023-05-24T13:46:35.952Z", "dateUpdated": "2024-08-02T15:54:14.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33970
Vulnerability from cvelistv5
Published
2023-06-05 19:54
Modified
2024-08-02 15:54
Severity ?
EPSS score ?
Summary
Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286 | x_refsource_CONFIRM | |
https://github.com/kanboard/kanboard/commit/b501ef44bc28ee9cf603a4fa446ee121d66f652f | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:54:14.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286" }, { "name": "https://github.com/kanboard/kanboard/commit/b501ef44bc28ee9cf603a4fa446ee121d66f652f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/b501ef44bc28ee9cf603a4fa446ee121d66f652f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.30" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it\u0027s a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T19:54:38.686Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286" }, { "name": "https://github.com/kanboard/kanboard/commit/b501ef44bc28ee9cf603a4fa446ee121d66f652f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/b501ef44bc28ee9cf603a4fa446ee121d66f652f" } ], "source": { "advisory": "GHSA-wfch-8rhv-v286", "discovery": "UNKNOWN" }, "title": "Missing access control in internal task links feature in Kanboard" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-33970", "datePublished": "2023-06-05T19:54:38.686Z", "dateReserved": "2023-05-24T13:46:35.954Z", "dateUpdated": "2024-08-02T15:54:14.110Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22720
Vulnerability from cvelistv5
Published
2024-01-24 00:00
Modified
2024-11-13 15:17
Severity ?
EPSS score ?
Summary
Kanboard 1.2.34 is vulnerable to Html Injection in the group management feature.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:51:11.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cupc4k3.medium.com/html-injection-vulnerability-in-kanboard-group-management-d9fe5154bb1b" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22720", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T15:17:36.153012Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T15:17:53.757Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard 1.2.34 is vulnerable to Html Injection in the group management feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-24T17:37:07.659924", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://cupc4k3.medium.com/html-injection-vulnerability-in-kanboard-group-management-d9fe5154bb1b" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-22720", "datePublished": "2024-01-24T00:00:00", "dateReserved": "2024-01-11T00:00:00", "dateUpdated": "2024-11-13T15:17:53.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15201
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 18:24
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tags of a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tags of a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15201", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tags of a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15201", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T18:24:25.029Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15202
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 21:07
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit columns of a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit columns of a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15202", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can edit columns of a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15202", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T21:07:29.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15203
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 19:10
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can remove categories from a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can remove categories from a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15203", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can remove categories from a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15203", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T19:10:49.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15204
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-17 04:14
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can add automatic actions to a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add automatic actions to a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15204", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add automatic actions to a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15204", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-17T04:14:59.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12851
Vulnerability from cvelistv5
Published
2017-08-14 20:00
Modified
2024-08-05 18:51
Severity ?
EPSS score ?
Summary
An authenticated standard user could reset the password of the admin by altering form data. Affects kanboard before 1.0.46.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/100352 | vdb-entry, x_refsource_BID | |
https://github.com/kanboard/kanboard/commit/b79b18efd7a1a8b591753a4eddd473f88d55b7df | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:51:06.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "100352", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100352" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/b79b18efd7a1a8b591753a4eddd473f88d55b7df" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An authenticated standard user could reset the password of the admin by altering form data. Affects kanboard before 1.0.46." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-17T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "100352", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100352" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/commit/b79b18efd7a1a8b591753a4eddd473f88d55b7df" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12851", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authenticated standard user could reset the password of the admin by altering form data. Affects kanboard before 1.0.46." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "100352", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100352" }, { "name": "https://github.com/kanboard/kanboard/commit/b79b18efd7a1a8b591753a4eddd473f88d55b7df", "refsource": "CONFIRM", "url": "https://github.com/kanboard/kanboard/commit/b79b18efd7a1a8b591753a4eddd473f88d55b7df" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12851", "datePublished": "2017-08-14T20:00:00", "dateReserved": "2017-08-14T00:00:00", "dateUpdated": "2024-08-05T18:51:06.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12850
Vulnerability from cvelistv5
Published
2017-08-14 20:00
Modified
2024-08-05 18:51
Severity ?
EPSS score ?
Summary
An authenticated standard user could reset the password of other users (including the admin) by altering form data. Affects kanboard before 1.0.46.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/88dd6abbf3f519897f2f6280e95c9eec9123a4ae | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100352 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:51:07.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/88dd6abbf3f519897f2f6280e95c9eec9123a4ae" }, { "name": "100352", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100352" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An authenticated standard user could reset the password of other users (including the admin) by altering form data. Affects kanboard before 1.0.46." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-17T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/commit/88dd6abbf3f519897f2f6280e95c9eec9123a4ae" }, { "name": "100352", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100352" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12850", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authenticated standard user could reset the password of other users (including the admin) by altering form data. Affects kanboard before 1.0.46." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/88dd6abbf3f519897f2f6280e95c9eec9123a4ae", "refsource": "CONFIRM", "url": "https://github.com/kanboard/kanboard/commit/88dd6abbf3f519897f2f6280e95c9eec9123a4ae" }, { "name": "100352", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100352" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12850", "datePublished": "2017-08-14T20:00:00", "dateReserved": "2017-08-14T00:00:00", "dateUpdated": "2024-08-05T18:51:07.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15205
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 22:09
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can download attachments from a private project of another user.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:15.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can download attachments from a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15205", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can download attachments from a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15205", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T22:09:15.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15197
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-17 02:53
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new category to a private project of another user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 | x_refsource_MISC | |
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:15.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new category to a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15197", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new category to a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" }, { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15197", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-17T02:53:07.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15209
Vulnerability from cvelistv5
Published
2017-10-10 05:00
Modified
2024-09-16 20:58
Severity ?
EPSS score ?
Summary
In Kanboard before 1.0.47, by altering form data, an authenticated user can remove attachments from a private project of another user.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2017/10/04/9 | x_refsource_MISC | |
https://kanboard.net/news/version-1.0.47 | x_refsource_MISC | |
https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can remove attachments from a private project of another user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T05:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kanboard.net/news/version-1.0.47" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15209", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kanboard before 1.0.47, by altering form data, an authenticated user can remove attachments from a private project of another user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openwall.com/lists/oss-security/2017/10/04/9", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/04/9" }, { "name": "https://kanboard.net/news/version-1.0.47", "refsource": "MISC", "url": "https://kanboard.net/news/version-1.0.47" }, { "name": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1", "refsource": "MISC", "url": "https://github.com/kanboard/kanboard/commit/7100f6de8a1f566e260b3e65312767e4cde112b1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15209", "datePublished": "2017-10-10T05:00:00Z", "dateReserved": "2017-10-10T00:00:00Z", "dateUpdated": "2024-09-16T20:58:55.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51747
Vulnerability from cvelistv5
Published
2024-11-11 19:22
Modified
2024-11-12 01:45
Severity ?
EPSS score ?
Summary
Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are viewable or downloadable in Kanboard are resolved through its `path` entry in the `project_has_files` SQLite db. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, can set arbitrary file links, by abusing path traversals. Once the modified db is uploaded and the project page is accessed, a file download can be triggered and all files, readable in the context of the Kanboard application permissions, can be downloaded. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-78pf-vg56-5p8v | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "kanboard", "vendor": "kanboard", "versions": [ { "lessThan": "1.2.42", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-51747", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T01:44:34.370605Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T01:45:29.297Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "\u003c 1.2.42" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are viewable or downloadable in Kanboard are resolved through its `path` entry in the `project_has_files` SQLite db. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, can set arbitrary file links, by abusing path traversals. Once the modified db is uploaded and the project page is accessed, a file download can be triggered and all files, readable in the context of the Kanboard application permissions, can be downloaded. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-27", "description": "CWE-27: Path Traversal: \u0027dir/../../filename\u0027", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T19:22:27.261Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-78pf-vg56-5p8v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-78pf-vg56-5p8v" } ], "source": { "advisory": "GHSA-78pf-vg56-5p8v", "discovery": "UNKNOWN" }, "title": "Arbitrary File Read and Delete in kanboard" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51747", "datePublished": "2024-11-11T19:22:27.261Z", "dateReserved": "2024-10-31T14:12:45.790Z", "dateUpdated": "2024-11-12T01:45:29.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36399
Vulnerability from cvelistv5
Published
2024-06-06 15:15
Modified
2024-08-02 03:37
Severity ?
EPSS score ?
Summary
Kanboard is project management software that focuses on the Kanban methodology. The vuln is in app/Controller/ProjectPermissionController.php function addUser(). The users permission to add users to a project only get checked on the URL parameter project_id. If the user is authorized to add users to this project the request gets processed. The users permission for the POST BODY parameter project_id does not get checked again while processing. An attacker with the 'Project Manager' on a single project may take over any other project. The vulnerability is fixed in 1.2.37.
References
▼ | URL | Tags |
---|---|---|
https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv | x_refsource_CONFIRM | |
https://github.com/kanboard/kanboard/commit/b6703688aac8187f5ea4d4d704fc7afeeffeafa7 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "kanboard", "vendor": "kanboard", "versions": [ { "lessThanOrEqual": "1.2.36", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36399", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T17:56:20.351547Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:57:49.863Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv" }, { "name": "https://github.com/kanboard/kanboard/commit/b6703688aac8187f5ea4d4d704fc7afeeffeafa7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kanboard/kanboard/commit/b6703688aac8187f5ea4d4d704fc7afeeffeafa7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kanboard", "vendor": "kanboard", "versions": [ { "status": "affected", "version": "1.2.37" } ] } ], "descriptions": [ { "lang": "en", "value": "Kanboard is project management software that focuses on the Kanban methodology. The vuln is in app/Controller/ProjectPermissionController.php function addUser(). The users permission to add users to a project only get checked on the URL parameter project_id. If the user is authorized to add users to this project the request gets processed. The users permission for the POST BODY parameter project_id does not get checked again while processing. An attacker with the \u0027Project Manager\u0027 on a single project may take over any other project. The vulnerability is fixed in 1.2.37." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T15:15:46.978Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv" }, { "name": "https://github.com/kanboard/kanboard/commit/b6703688aac8187f5ea4d4d704fc7afeeffeafa7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kanboard/kanboard/commit/b6703688aac8187f5ea4d4d704fc7afeeffeafa7" } ], "source": { "advisory": "GHSA-x8v7-3ghx-65cv", "discovery": "UNKNOWN" }, "title": "Kanboard affected by Project Takeover via IDOR in ProjectPermissionController" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-36399", "datePublished": "2024-06-06T15:15:46.978Z", "dateReserved": "2024-05-27T15:59:57.030Z", "dateUpdated": "2024-08-02T03:37:05.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }