Page 2 of 30 results (0.003 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

Kanboard is open source project management software that focuses on the Kanban methodology. Versions prior to 1.2.30 are subject to a missing access control vulnerability that allows a user with low privileges to create or transfer tasks to any project within the software, even if they have not been invited or the project is personal. The vulnerable features are `Duplicate to project` and `Move to project`, which both utilize the `checkDestinationProjectValues()` function to check his values. This issue has been addressed in version 1.2.30. Users are advised to upgrade. • https://github.com/kanboard/kanboard/commit/c20be8f5fa26e54005a90c645e80b11481a65053 https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr • CWE-862: Missing Authorization •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Kanboard is open source project management software that focuses on the Kanban methodology. Versions prior to 1.2.30 are subject to an Insecure direct object reference (IDOR) vulnerability present in the application's URL parameter. This vulnerability enables any user to read files uploaded by any other user, regardless of their privileges or restrictions. By Changing the file_id any user can render all the files where MimeType is image uploaded under **/files** directory regard less of uploaded by any user. This vulnerability poses a significant impact and severity to the application's security. • https://github.com/kanboard/kanboard/commit/437b141fa2267df36976814e704517f30d2424bd https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Kanboard is project management software that focuses on the Kanban methodology. Due to improper handling of elements under the `contentEditable` element, maliciously crafted clipboard content can inject arbitrary HTML tags into the DOM. A low-privileged attacker with permission to attach a document on a vulnerable Kanboard instance can trick the victim into pasting malicious screenshot data and achieve cross-site scripting if CSP is improperly configured. This issue has been patched in version 1.2.29. • https://github.com/kanboard/kanboard/commit/26b6eebb78d4306e48b836a58f7c386251aa2bc7 https://github.com/kanboard/kanboard/commit/c9c187206700030c43493b80fd599b4d096cb713 https://github.com/kanboard/kanboard/security/advisories/GHSA-hjmw-gm82-r4gv • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

A server-side request forgery vulnerability exists in Jenkins Kanboard Plugin 1.5.10 and earlier in KanboardGlobalConfiguration.java that allows attackers with Overall/Read permission to submit a GET request to an attacker-specified URL. Existe una vulnerabilidad Server-Side Request Forgery (SSRF) en Jenkins Kanboard Plugin, en versiones 1.5.10 y anteriores, en KanboardGlobalConfiguration.java, que permite que atacantes con el permiso Overall/Read envíen una petición GET a una URL especificada por el atacante. • https://jenkins.io/security/advisory/2019-01-28/#SECURITY-818 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

app/Core/Paginator.php in Kanboard before 1.2.8 has XSS in pagination sorting. app/Core/Paginator.php en Kanboard, en versiones anteriores a la 1.2.8, tiene Cross-Site Scripting (XSS) en la ordenación de paginación. Kanboard version 1.2.7 suffers from a cross site scripting vulnerability. • http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2019/May/41 https://github.com/kanboard/kanboard/commit/83deec2e3621c40d15a06e2491f27571d32fe10f https://github.com/kanboard/kanboard/releases/tag/v1.2.8 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •