Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-36399

Опубликовано: 06 июн. 2024
Источник: debian
EPSS Низкий

Описание

Kanboard is project management software that focuses on the Kanban methodology. The vuln is in app/Controller/ProjectPermissionController.php function addUser(). The users permission to add users to a project only get checked on the URL parameter project_id. If the user is authorized to add users to this project the request gets processed. The users permission for the POST BODY parameter project_id does not get checked again while processing. An attacker with the 'Project Manager' on a single project may take over any other project. The vulnerability is fixed in 1.2.37.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kanboardfixed1.2.44+ds-1package

Примечания

  • https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv

  • https://github.com/kanboard/kanboard/commit/b6703688aac8187f5ea4d4d704fc7afeeffeafa7 (v1.2.37)

EPSS

Процентиль: 39%
0.00178
Низкий

Связанные уязвимости

CVSS3: 8.2
nvd
больше 1 года назад

Kanboard is project management software that focuses on the Kanban methodology. The vuln is in app/Controller/ProjectPermissionController.php function addUser(). The users permission to add users to a project only get checked on the URL parameter project_id. If the user is authorized to add users to this project the request gets processed. The users permission for the POST BODY parameter project_id does not get checked again while processing. An attacker with the 'Project Manager' on a single project may take over any other project. The vulnerability is fixed in 1.2.37.

EPSS

Процентиль: 39%
0.00178
Низкий