Vulnerability Details : CVE-2023-33970
Potential exploit
Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Products affected by CVE-2023-33970
- cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-33970
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-33970
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
2.8
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2023-33970
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-33970
-
https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286
Missing access control in internal task links feature · Advisory · kanboard/kanboard · GitHubExploit;Third Party Advisory
-
https://github.com/kanboard/kanboard/commit/b501ef44bc28ee9cf603a4fa446ee121d66f652f
Add missing permission check when creating/updating internal links · kanboard/kanboard@b501ef4 · GitHubPatch
Jump to