ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
References
Link | Resource |
---|---|
https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/projectsend-auth-bypass.yaml | Third Party Advisory |
https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744 | Patch |
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/projectsend_unauth_rce.rb | Exploit |
https://vulncheck.com/advisories/projectsend-bypass | Third Party Advisory |
https://www.synacktiv.com/sites/default/files/2024-07/synacktiv-projectsend-multiple-vulnerabilities.pdf | Mitigation Technical Description Third Party Advisory |
Configurations
History
06 Dec 2024, 18:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 | |
CPE | cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:* | |
First Time |
Projectsend
Projectsend projectsend |
|
References | () https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/projectsend-auth-bypass.yaml - Third Party Advisory | |
References | () https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744 - Patch | |
References | () https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/projectsend_unauth_rce.rb - Exploit | |
References | () https://vulncheck.com/advisories/projectsend-bypass - Third Party Advisory | |
References | () https://www.synacktiv.com/sites/default/files/2024-07/synacktiv-projectsend-multiple-vulnerabilities.pdf - Mitigation, Technical Description, Third Party Advisory |
26 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-26 10:15
Updated : 2024-12-06 18:42
NVD link : CVE-2024-11680
Mitre link : CVE-2024-11680
CVE.ORG link : CVE-2024-11680
JSON object : View
Products Affected
projectsend
- projectsend