Remote Code Execution in Kanboard Project Management Software by Kanboard
CVE-2024-51748

7.2HIGH

Key Information:

Vendor
Kanboard
Status
Vendor
CVE Published:
11 November 2024

Summary

Kanboard, a project management software using the Kanban methodology, has a severe vulnerability that allows authenticated admin users to execute arbitrary PHP code on the server due to improper handling of file uploads. This issue arises when an attacker is able to upload a specially crafted SQLite database containing malicious PHP code. By leveraging a feature that allows file uploads, and manipulating the application_language setting in the settings table, the attacker can exploit path traversal and gain control of the execution flow. It is essential for users of Kanboard to upgrade to version 1.2.42 or later to mitigate this security issue, as there are currently no known workarounds.

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.
CVE-2024-51748 : Remote Code Execution in Kanboard Project Management Software by Kanboard | SecurityVulnerability.io