Executive Summary

Informations
Name CVE-2024-55603 First vendor Publication 2024-12-19
Vendor Cve Last vendor Modification 2025-03-12

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Overall CVSS Score 6.5
Base Score 6.5 Environmental Score 6.5
impact SubScore 2.5 Temporal Score 6.5
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact Low
Integrity Impact Low Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (`app/Core/Session/SessionHandler.php`), to store the session data in a database. Therefore, when a `session_id` is given, kanboard queries the data from the `sessions` sql table. At this point, it does not correctly verify, if a given `session_id` has already exceeded its lifetime (`expires_at`). Thus, a session which's lifetime is already `> time()`, is still queried from the database and hence a valid login. The implemented **SessionHandlerInterface::gc** function, that does remove invalid sessions, is called only **with a certain probability** (_Cleans up expired sessions. Called by `session_start()`, based on `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` settings_) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gc_probability=1, session.gc_divisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55603

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-613 Insufficient Session Expiration

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 54

Sources (Detail)

https://github.com/kanboard/kanboard/blob/main/app/Core/Session/SessionHandle...
https://github.com/kanboard/kanboard/commit/7ce61c34d962ca8b5dce776289ddf4b20...
https://github.com/kanboard/kanboard/security/advisories/GHSA-gv5c-8pxr-p484
https://www.php.net/manual/en/function.session-start.php
https://www.php.net/manual/en/session.configuration.php#ini.session.gc-divisor
https://www.php.net/manual/en/session.configuration.php#ini.session.gc-maxlif...
https://www.php.net/manual/en/session.configuration.php#ini.session.gc-probab...
https://www.php.net/manual/en/sessionhandlerinterface.gc.php
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-03-12 21:20:55
  • Multiple Updates
2024-12-19 05:20:29
  • First insertion