Source: kanboard
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for kanboard.

CVE-2024-51747[0]:
| Kanboard is project management software that focuses on the Kanban
| methodology. An authenticated Kanboard admin can read and delete
| arbitrary files from the server. File attachments, that are viewable
| or downloadable in Kanboard are resolved through its `path` entry in
| the `project_has_files`  SQLite db. Thus, an attacker who can upload
| a modified sqlite.db through the dedicated feature, can set
| arbitrary file links, by abusing path traversals. Once the modified
| db is uploaded and the project page is accessed, a file download can
| be triggered and all files, readable in the context of the Kanboard
| application permissions, can be downloaded. This issue has been
| addressed in version 1.2.42 and all users are advised to upgrade.
| There are no known workarounds for this vulnerability.

https://github.com/kanboard/kanboard/security/advisories/GHSA-78pf-vg56-5p8v


CVE-2024-51748[1]:
| Kanboard is project management software that focuses on the Kanban
| methodology. An authenticated Kanboard admin can run arbitrary php
| code on the server in combination with a file write possibility. The
| user interface language is determined and loaded by the setting
| `application_language` in the `settings` table. Thus, an attacker
| who can upload a modified sqlite.db through the dedicated feature,
| has control over the filepath, which is loaded. Exploiting this
| vulnerability has one constraint: the attacker must be able to place
| a file (called translations.php) on the system. However, this is not
| impossible, think of anonymous FTP server or another application
| that allows uploading files. Once the attacker has placed its file
| with the actual php code as the payload, the attacker can craft a
| sqlite db settings, which uses path traversal to point to the
| directory, where the `translations.php` file is stored. Then gaining
| code execution after importing the crafted sqlite.db. This issue has
| been addressed in version 1.2.42 and all users are advised to
| upgrade. There are no known workarounds for this vulnerability.

https://github.com/kanboard/kanboard/security/advisories/GHSA-jvff-x577-j95p


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-51747
    https://www.cve.org/CVERecord?id=CVE-2024-51747
[1] https://security-tracker.debian.org/tracker/CVE-2024-51748
    https://www.cve.org/CVERecord?id=CVE-2024-51748

Please adjust the affected versions in the BTS as needed.

Reply via email to