cve/2023/CVE-2023-33969.md

18 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-33969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33969)
![](https://img.shields.io/static/v1?label=Product&message=kanboard&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.2.30%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Kanboard is open source project management software that focuses on the Kanban methodology. A stored Cross site scripting (XSS) allows an attacker to execute arbitrary Javascript and any user who views the task containing the malicious code will be exposed to the XSS attack. Note: The default CSP header configuration blocks this javascript attack. This issue has been addressed in version 1.2.30. Users are advised to upgrade. Users unable to upgrade should ensure that they have a restrictive CSP header config.
### POC
#### Reference
- https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9
#### Github
No PoCs found on GitHub currently.