cve/2024/CVE-2024-54001.md
2025-09-29 21:09:30 +02:00

19 lines
1.1 KiB
Markdown

### [CVE-2024-54001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54001)
![](https://img.shields.io/static/v1?label=Product&message=kanboard&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%201.2.41%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)&color=brightgreen)
### Description
Kanboard is project management software that focuses on the Kanban methodology. HTML can be injected and stored into the application settings section. The fields application_language, application_date_format,application_timezone and application_time_format allow arbirary user input which is reflected. The vulnerability can become xss if the user input is javascript code that bypass CSP. This vulnerability is fixed in 1.2.41.
### POC
#### Reference
- https://github.com/kanboard/kanboard/security/advisories/GHSA-4vvp-jf72-chrj
#### Github
No PoCs found on GitHub currently.