Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are viewable or downloadable in Kanboard are resolved through its `path` entry in the `project_has_files` SQLite db. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, can set arbitrary file links, by abusing path traversals. Once the modified db is uploaded and the project page is accessed, a file download can be triggered and all files, readable in the context of the Kanboard application permissions, can be downloaded. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Kanboard
Kanboard kanboard |
|
CPEs | cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:* | |
Vendors & Products |
Kanboard
Kanboard kanboard |
|
Metrics |
ssvc
|
Mon, 11 Nov 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are viewable or downloadable in Kanboard are resolved through its `path` entry in the `project_has_files` SQLite db. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, can set arbitrary file links, by abusing path traversals. Once the modified db is uploaded and the project page is accessed, a file download can be triggered and all files, readable in the context of the Kanboard application permissions, can be downloaded. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Arbitrary File Read and Delete in kanboard | |
Weaknesses | CWE-22 CWE-27 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-11T19:22:27.261Z
Updated: 2024-11-12T01:45:29.297Z
Reserved: 2024-10-31T14:12:45.790Z
Link: CVE-2024-51747
Vulnrichment
Updated: 2024-11-12T01:45:25.349Z
NVD
Status : Awaiting Analysis
Published: 2024-11-11T20:15:19.197
Modified: 2024-11-12T13:55:21.227
Link: CVE-2024-51747
Redhat
No data.