NA

CVE-2023-33968

Published: 05/06/2023 Updated: 12/06/2023
CVSS v3 Base Score: 5.4 | Impact Score: 2.5 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Kanboard is open source project management software that focuses on the Kanban methodology. Versions before 1.2.30 are subject to a missing access control vulnerability that allows a user with low privileges to create or transfer tasks to any project within the software, even if they have not been invited or the project is personal. The vulnerable features are `Duplicate to project` and `Move to project`, which both utilize the `checkDestinationProjectValues()` function to check his values. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Vulnerable Product Search on Vulmon Subscribe to Product

kanboard kanboard

Vendor Advisories

Debian Bug report logs - #1037167 kanboard: CVE-2023-33956 CVE-2023-33968 CVE-2023-33969 CVE-2023-33970 Package: src:kanboard; Maintainer for src:kanboard is Joseph Nahmias <jello@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 6 Jun 2023 19:12:02 UTC Severity: important Tags: security, ...