CVE-2024-51747

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)

Published: Nov 11, 2024 / Updated: 8d ago

010
CVSS 9.1EPSS 0.04%Critical
CVE info copied to clipboard

Summary

Kanboard, a project management software focusing on the Kanban methodology, has a vulnerability where an authenticated Kanboard admin can read and delete arbitrary files from the server. This is possible due to how file attachments are resolved through the 'path' entry in the 'project_has_files' SQLite database. An attacker who can upload a modified sqlite.db through the dedicated feature can set arbitrary file links by abusing path traversals. When the modified db is uploaded and the project page is accessed, a file download can be triggered, allowing all files readable within the Kanboard application permissions to be downloaded.

Impact

This vulnerability has a high severity with a CVSS v3.1 base score of 9.1. It allows for unauthorized access to potentially sensitive files on the server, which could lead to data breaches, information disclosure, and potential system compromise. The attacker could read and delete arbitrary files, potentially causing data loss or system instability. Given the "Changed" scope in the CVSS score, this vulnerability might have impacts beyond the vulnerable component itself.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. This vulnerability has been addressed in Kanboard version 1.2.42. All users are advised to upgrade to this version or later.

Mitigation

The primary mitigation is to upgrade Kanboard to version 1.2.42 or later. There are no known workarounds for this vulnerability, making the upgrade crucial. In addition to upgrading, it's recommended to: 1. Restrict admin access to trusted personnel only. 2. Monitor system logs for any suspicious file access or modification attempts. 3. Implement strong access controls and authentication mechanisms. 4. Regularly backup important data to mitigate potential data loss from file deletions. 5. Consider implementing additional file integrity monitoring tools to detect unauthorized changes to system files.

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-51747

Nov 11, 2024 at 8:15 PM
CVSS

A CVSS base score of 9.1 has been assigned.

Nov 11, 2024 at 8:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-51747. See article

Nov 11, 2024 at 8:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 11, 2024 at 8:24 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 11.6%)

Nov 12, 2024 at 9:54 AM
Static CVE Timeline Graph

Affected Systems

Kanboard/kanboard
+null more

Attack Patterns

CAPEC-126: Path Traversal
+null more

News

⚠️⚠️ CVE-2024-51747 & CVE-2024-51748 New Critical Vulnerabilities in Kanboard Project Management Software: Admins Urged to Patch 🎯5.5k+ Results are found on the https://en.fofa.info nearly year. 🔗FOFA Link:https://en.fofa.info/result?qbase64=YXBwPSJLYW5ib2FyZCI%3D FOFA Query:app="Kanboard" 🔖Refer: https://securityonline.info/new-critical-vulnerabilities-in-kanboard-project-management-software-admins-urged-to-patch/ #OSINT #FOFA #CyberSecurity #vulnerability
⚠️⚠️ CVE-2024-51747 & CVE-2024-51748 New Critical Vulnerabilities in Kanboard Project Management Software: Admins Urged to Patch 🎯5.5k+ Results are found on the en.fofa.info nearly year. 🔗FOFA Link: en.fofa.info/result?qbase64=… FOFA Query:app="Kanboard" 🔖Refer: securityonline.info/new-crit… #OSINT #FOFA #CyberSecurity #vulnerability
New Critical Vulnerabilities in Kanboard Project Management Software: Admins Urged to Patch
Two severe vulnerabilities have been discovered in Kanboard, a project management software that adheres to the Kanban methodology. Both vulnerabilities, identified by Deutsche Telekom Security GmbH, pose significant threats to... The post New Critical Vulnerabilities in Kanboard Project Management Software: Admins Urged to Patch appeared first on Cybersecurity News .
CVE-2024-51747
Critical Severity Description Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are viewable or downloadable in Kanboard are resolved through its `path` entry in the `project_has_files` SQLite db. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, can set arbitrary file links, by abusing path traversals. Once the modified db is uploaded and the project page is accessed, a file download can be triggered and all files, readable in the context of the Kanboard application permissions, can be downloaded. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability. Read more at https://www.tenable.com/cve/CVE-2024-51747
Arbitrary File Read and Delete in kanboard
Kanboard - CRITICAL - CVE-2024-51747 Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are viewable or downloadable in Kanboard are resolved through its `path` entry in the `project_has_files` SQLite db. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, can set arbitrary file links, by abusing path traversals. Once the modified db is uploaded and the project page is accessed, a file download can be triggered and all files, readable in the context of the Kanboard application permissions, can be downloaded. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
NA - CVE-2024-51747 - Kanboard is project management software that...
Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are...
See 9 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:None
Scope:Changed
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI