DEBIAN-CVE-2024-55603

Source
https://security-tracker.debian.org/tracker/CVE-2024-55603
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-55603.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-55603
Upstream
Published
2024-12-19T00:15:06.713Z
Modified
2026-03-11T07:37:27.499839Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (app/Core/Session/SessionHandler.php), to store the session data in a database. Therefore, when a session_id is given, kanboard queries the data from the sessions sql table. At this point, it does not correctly verify, if a given session_id has already exceeded its lifetime (expires_at). Thus, a session which's lifetime is already > time(), is still queried from the database and hence a valid login. The implemented SessionHandlerInterface::gc function, that does remove invalid sessions, is called only with a certain probability (Cleans up expired sessions. Called by session_start(), based on session.gc_divisor, session.gc_probability and session.gc_maxlifetime settings) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gcprobability=1, session.gcdivisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Debian:14 / kanboard

Package

Name
kanboard
Purl
pkg:deb/debian/kanboard?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.44+ds-1

Affected versions

1.*
1.2.22+ds-1
1.2.23+ds-1
1.2.23+ds-1.1
1.2.25+ds-1
1.2.25+ds-2
1.2.25+ds-3
1.2.26+ds-1
1.2.26+ds-2
1.2.26+ds-3
1.2.26+ds-4
1.2.30+ds-1
1.2.31+ds-1
1.2.31+ds2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-55603.json"