A vulnerability was detected in WeKan up to 8.20. This impacts an unknown function of the file models/checklistItems.js of the component REST API. Performing a manipulation of the argument item.cardId/item.checklistId/card.boardId results in improper authorization.
Remote exploitation of the attack is possible. Upgrading to version 8.21 will fix this issue. The patch is named 251d49eea94834cf351bb395808f4a56fb4dbb44.
Upgrading the affected component is recommended.
Attack Parameters
Attack Vector
Network
Атака возможна удалённо
Attack Complexity
Low
Легко эксплуатировать
Attack Requirements
None
Нет дополнительных условий
Privileges Required
Low
Нужны базовые права
User Interaction
None
Не нужно действие пользователя
Impact Assessment
Confidentiality
Low
Частичная утечка данных
Integrity
Low
Частичная модификация данных
Availability
Low
Частичное нарушение работы
CVSS Vector v4.0
Weakness Type (CWE)
References 6
https://github.com/wekan/wekan/
cna@vuldb.com
https://github.com/wekan/wekan/commit/251d49eea94834cf351bb395808f4a56fb4dbb44
cna@vuldb.com
https://github.com/wekan/wekan/releases/tag/v8.21
cna@vuldb.com
https://vuldb.com/?ctiid.344266
cna@vuldb.com
https://vuldb.com/?id.344266
cna@vuldb.com
https://vuldb.com/?submit.742663
cna@vuldb.com