Name | CVE-2024-36399 |
Description | Kanboard is project management software that focuses on the Kanban methodology. The vuln is in app/Controller/ProjectPermissionController.php function addUser(). The users permission to add users to a project only get checked on the URL parameter project_id. If the user is authorized to add users to this project the request gets processed. The users permission for the POST BODY parameter project_id does not get checked again while processing. An attacker with the 'Project Manager' on a single project may take over any other project. The vulnerability is fixed in 1.2.37. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1072791 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
kanboard (PTS) | bookworm, bookworm (security) | 1.2.26+ds-2+deb12u2 | vulnerable |
| sid | 1.2.31+ds2-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
kanboard | source | (unstable) | (unfixed) | | | 1072791 |
Notes
[bookworm] - kanboard <no-dsa> (Minor issue, can be fixed via point release)
https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv
https://github.com/kanboard/kanboard/commit/b6703688aac8187f5ea4d4d704fc7afeeffeafa7 (v1.2.37)