CVE-2023-33969

NameCVE-2023-33969
DescriptionKanboard is open source project management software that focuses on the Kanban methodology. A stored Cross site scripting (XSS) allows an attacker to execute arbitrary Javascript and any user who views the task containing the malicious code will be exposed to the XSS attack. Note: The default CSP header configuration blocks this javascript attack. This issue has been addressed in version 1.2.30. Users are advised to upgrade. Users unable to upgrade should ensure that they have a restrictive CSP header config.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1037167

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kanboard (PTS)bookworm, bookworm (security)1.2.26+ds-2+deb12u2fixed
sid1.2.31+ds2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kanboardsourcebookworm1.2.26+ds-2+deb12u1
kanboardsource(unstable)1.2.26+ds-41037167

Notes

https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9
https://github.com/kanboard/kanboard/commit/05f1d23d821152cd61536d3b09e522c0f7573e3c (v1.2.30)

Search for package or bug name: Reporting problems