diff options
author | Fernando ApesteguĂa <fernape@FreeBSD.org> | 2025-06-26 10:30:15 +0200 |
---|---|---|
committer | Fernando ApesteguĂa <fernape@FreeBSD.org> | 2025-06-26 10:31:15 +0200 |
commit | 120ea66801c392c89ca9db503754076687c3991a (patch) | |
tree | cd76fc7f0fbb3a7ebe56498c87496c3f3757a929 | |
parent | devel/hotspot: Unbreak build with Qt 6 (diff) |
security/vuxml: Add kanboard vulnerability
* CVE-2025-52560
* CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
-rw-r--r-- | security/vuxml/vuln/2025.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 8ebba07bf8bd..042957fdf1f6 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,39 @@ + <vuln vid="e26608ff-5266-11f0-b522-b42e991fc52e"> + <topic>kanboard -- Password Reset Poisoning via Host Header Injection</topic> + <affects> + <package> + <name>kanboard</name> + <range><lt>1.2.45</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>GitHub Security Advisories reports:</p> + <blockquote cite="null"> + <p> + Kanboard allows password reset emails to be sent with URLs + derived from the unvalidated Host header when the + application_url configuration is unset (default behavior). + This allows an attacker to craft a malicious password + reset link that leaks the token to an attacker-controlled + domain. If a victim (including an administrator) clicks + the poisoned link, their account can be taken over. This + affects all users who initiate a password reset while + application_url is not set. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-52560</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-52560</url> + </references> + <dates> + <discovery>2025-06-26</discovery> + <entry>2025-06-26</entry> + </dates> + </vuln> + <vuln vid="d45dabd9-5232-11f0-9ca4-2cf05da270f3"> <topic>Gitlab -- Vulnerabilities</topic> <affects> |