From nobody Tue Dec 24 11:26:06 2024 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YHXdW0Q38z5h1w9; Tue, 24 Dec 2024 11:26:07 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YHXdV5qtmz4jXq; Tue, 24 Dec 2024 11:26:06 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1735039566; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=o2b0VxwF9sEqRGHM88pMLSJvbK5bibViQTdNwBArHt0=; b=gmcGAr/7P+nNwYrvI3+t5WVlnMRe0YhU92bKI9kjZvapnjqT2C2tOWQ50bnKljTUW4O541 mPycnZwqZXbyiGoSOdOSWZCjsjlcdwVKrbgZJi6lr5kGc9ndx6/MGLprVLhgJAmD479Tl7 6oYxTQdaUBTuoyOa6UrykF3KM2O/9HR2WAqc4jV2oSFgCwPtN24ud5EBQ3nAu89j1hIjNM Zq8zEF69j5m/FfgoZ/Gb9/kmP9yPQzCmM2+OM5y1CFURSz40rCmLd+Cj9guj84tyM8yljR uwYNXZrokkA0zx81IHhIZp33D42DJ3DsiRcRn3fUcaqDLbOFPlAkuL7iLRnGhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1735039566; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=o2b0VxwF9sEqRGHM88pMLSJvbK5bibViQTdNwBArHt0=; b=O7eIdM0Z+g0YPU0wklAkt0i/dE7gVsn60KF4/mYxZhQCdy5DG0VlXdSBEvHvyqKqjXF5TC us9F3JWgjF5B5WzyEJyJRJT53YmA/6Y575wGiLRUgT65/vKNFb7sZNC4usrjBu8kd4r6KC AMZZ7sFLN0V3xW5KLrHwdKjgh0A9xhDMrmoHy05q/VD4dP2xA+utO2I3HlKNosdvjRHB4P Ee1VSF+0gPusixG0fVsttPabCmX8rsyzsMmcZ0VatbppqO1WGU+dDJMF68eKZYUubLyo5f XN8HgLPAeW4QpS5/z2lEY2L2YlAxpp75NKYW4ilVF60Dw0aI0pc8s2ET+xeybg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1735039566; a=rsa-sha256; cv=none; b=q8LMfSKh5ObJr1jwe5S1ZBQvF1Iy1Sec/ih7OmdDIQ+W6tbkLbnjEqfl09D0tpICgertBh G/X36LVRFNDJOtgg/8YeTe6q/uA2sUFbjuUxG6UWUVDDJjGf4D8EjUPtVE0mlMMrGQYf54 QN2+FyGqpHDhaXKgA7a2kx+foMAUZjmVsvG3Rz6lwbhk48G25qbFDIIzaej1JFkjtdJlAC +1x7OePAmrVa2N2Rr4i4papdI6ocrODQfbfQ27+Tj8wNRt7jr5A9GYXnCCO2+twyv+KERY +qhfgCCyfOTHIWfHvQzPar26TvqMhCyMYzILTDw813u2q5wxFZ7VY2uxYR8U6A== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YHXdV3GG3zcP3; Tue, 24 Dec 2024 11:26:06 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 4BOBQ6aW018552; Tue, 24 Dec 2024 11:26:06 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 4BOBQ6X1018549; Tue, 24 Dec 2024 11:26:06 GMT (envelope-from git) Date: Tue, 24 Dec 2024 11:26:06 GMT Message-Id: <202412241126.4BOBQ6X1018549@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Fernando =?utf-8?Q?Apestegu=C3=ADa?= Subject: git: 76e3c4707232 - main - security/vuxml: www/kanboard vulnerability List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: fernape X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 76e3c470723265f15672d2e4ea512c6b85b5fc78 Auto-Submitted: auto-generated The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=76e3c470723265f15672d2e4ea512c6b85b5fc78 commit 76e3c470723265f15672d2e4ea512c6b85b5fc78 Author: Fernando ApesteguĂ­a AuthorDate: 2024-12-24 11:25:23 +0000 Commit: Fernando ApesteguĂ­a CommitDate: 2024-12-24 11:25:23 +0000 security/vuxml: www/kanboard vulnerability Insufficient session validation. --- security/vuxml/vuln/2024.xml | 44 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 044dfb47cf91..9ae28639c8fa 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,47 @@ + + kanboard -- Insufficient session invalidation + + + kanboard + 1.2.43 + + + + +

security-advisories@github.com reports:

+
+

Kanboard is project management software that focuses on the Kanban + methodology. In affected versions sessions are still usable even + though their lifetime has exceeded. Kanboard implements a cutom + session handler (`app/Core/Session/SessionHandler.php`), to store + the session data in a database. Therefore, when a `session_id` is + given, kanboard queries the data from the `sessions` sql table. At + this point, it does not correctly verify, if a given `session_id` + has already exceeded its lifetime (`expires_at`). Thus, a session + which's lifetime is already `> time()`, is still queried + from the database and hence a valid login. The implemented + **SessionHandlerInterface::gc** function, that does remove invalid + sessions, is called only **with a certain probability** (_Cleans + up expired sessions. Called by `session_start()`, based on + `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` + settings_) accordingly to the php documentation. In the official + Kanboard docker image these values default to: session.gc_probability=1, + session.gc_divisor=1000. Thus, an expired session is only terminated + with probability 1/1000. There are no known workarounds for + this vulnerability.

+
+ +
+ + CVE-2024-55603 + https://nvd.nist.gov/vuln/detail/CVE-2024-55603 + + + 2024-12-19 + 2024-12-24 + +
+ Vaultwarden -- Admin organization permissions