cve/2024/CVE-2024-36399.md

20 lines
1.4 KiB
Markdown
Raw Permalink Normal View History

2024-06-07 04:52:01 +00:00
### [CVE-2024-36399](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36399)
![](https://img.shields.io/static/v1?label=Product&message=kanboard&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.2.37%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-285%3A%20Improper%20Authorization&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen)
### Description
Kanboard is project management software that focuses on the Kanban methodology. The vuln is in app/Controller/ProjectPermissionController.php function addUser(). The users permission to add users to a project only get checked on the URL parameter project_id. If the user is authorized to add users to this project the request gets processed. The users permission for the POST BODY parameter project_id does not get checked again while processing. An attacker with the 'Project Manager' on a single project may take over any other project. The vulnerability is fixed in 1.2.37.
### POC
#### Reference
- https://github.com/kanboard/kanboard/security/advisories/GHSA-x8v7-3ghx-65cv
#### Github
No PoCs found on GitHub currently.