Remote Code Execution in Kanboard Project Management Software by Kanboard
CVE-2024-51748
7.2HIGH
Summary
Kanboard, a project management software using the Kanban methodology, has a severe vulnerability that allows authenticated admin users to execute arbitrary PHP code on the server due to improper handling of file uploads. This issue arises when an attacker is able to upload a specially crafted SQLite database containing malicious PHP code. By leveraging a feature that allows file uploads, and manipulating the application_language
setting in the settings
table, the attacker can exploit path traversal and gain control of the execution flow. It is essential for users of Kanboard to upgrade to version 1.2.42 or later to mitigate this security issue, as there are currently no known workarounds.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published