Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-33970

Опубликовано: 05 июн. 2023
Источник: debian
EPSS Низкий

Описание

Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kanboardfixed1.2.26+ds-4package
kanboardfixed1.2.26+ds-2+deb12u1bookwormpackage

Примечания

  • https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286

  • https://github.com/kanboard/kanboard/commit/b501ef44bc28ee9cf603a4fa446ee121d66f652f (v1.2.30)

EPSS

Процентиль: 38%
0.00167
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 2 лет назад

Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 5.4
nvd
больше 2 лет назад

Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 38%
0.00167
Низкий