Headline
Debian Security Advisory 5454-1
Debian Linux Security Advisory 5454-1 - Riccardo Bonafede discovered that the Kanboard project management software was susceptible to SQL injection.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Debian Security Advisory DSA-5454-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
July 16, 2023 https://www.debian.org/security/faq
Package : kanboard
CVE ID : CVE-2023-36813
Riccardo Bonafede discovered that the Kanboard project management
software was susceptible to SQL injection.
For the stable distribution (bookworm), this problem has been fixed in
version 1.2.26+ds-2+deb12u2.
We recommend that you upgrade your kanboard packages.
For the detailed security status of kanboard please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/kanboard
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----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=pXzA
-----END PGP SIGNATURE-----
Related news
Kanboard is project management software that focuses on the Kanban methodology. In versions prior to 1.2.31authenticated user is able to perform a SQL Injection, leading to a privilege escalation or loss of confidentiality. It appears that in some insert and update operations, the code improperly uses the PicoDB library to update/insert new information. Version 1.2.31 contains a fix for this issue.