summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFernando ApesteguĂ­a <fernape@FreeBSD.org>2025-06-26 10:30:15 +0200
committerFernando ApesteguĂ­a <fernape@FreeBSD.org>2025-06-26 10:31:15 +0200
commit120ea66801c392c89ca9db503754076687c3991a (patch)
treecd76fc7f0fbb3a7ebe56498c87496c3f3757a929
parentdevel/hotspot: Unbreak build with Qt 6 (diff)
security/vuxml: Add kanboard vulnerability
* CVE-2025-52560 * CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
-rw-r--r--security/vuxml/vuln/2025.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 8ebba07bf8bd..042957fdf1f6 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,39 @@
+ <vuln vid="e26608ff-5266-11f0-b522-b42e991fc52e">
+ <topic>kanboard -- Password Reset Poisoning via Host Header Injection</topic>
+ <affects>
+ <package>
+ <name>kanboard</name>
+ <range><lt>1.2.45</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>GitHub Security Advisories reports:</p>
+ <blockquote cite="null">
+ <p>
+ Kanboard allows password reset emails to be sent with URLs
+ derived from the unvalidated Host header when the
+ application_url configuration is unset (default behavior).
+ This allows an attacker to craft a malicious password
+ reset link that leaks the token to an attacker-controlled
+ domain. If a victim (including an administrator) clicks
+ the poisoned link, their account can be taken over. This
+ affects all users who initiate a password reset while
+ application_url is not set.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-52560</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-52560</url>
+ </references>
+ <dates>
+ <discovery>2025-06-26</discovery>
+ <entry>2025-06-26</entry>
+ </dates>
+ </vuln>
+
<vuln vid="d45dabd9-5232-11f0-9ca4-2cf05da270f3">
<topic>Gitlab -- Vulnerabilities</topic>
<affects>