OpenProject is open source project management software. Prior to version 14.3.0, using a forged HOST header in the default configuration of packaged installations and using the "Login required" setting, an attacker could redirect to a remote host to initiate a phishing attack against an OpenProject user's account. This vulnerability affects default packaged installation of OpenProject without any additional configuration or modules on Apache (such as mod_security, manually setting a host name, having a fallthrough VirtualHost). It might also affect other installations that did not take care to fix the HOST/X-Forwarded-Host headers. Version 14.3.0 includes stronger protections for the hostname from within the application using the HostAuthorization middleware of Rails to reject any requests with a host name that does not match the configured one. Also, all generated links by the application are now ensured to use the built-in hostname. Users who aren't able to upgrade immediately may use mod_security for Apache2 or manually fix the Host and X-Forwarded-Host headers in their proxying application before reaching the application server of OpenProject. Alternatively, they can manually apply the patch to opt-in to host header protections in previous versions of OpenProject.
References
Link | Resource |
---|---|
https://github.com/opf/openproject/security/advisories/GHSA-g92v-vrq6-4fpw | Vendor Advisory |
https://github.com/user-attachments/files/16371759/host-protection.patch | Patch |
https://www.openproject.org/docs/release-notes/14-3-0 | Release Notes |
Configurations
History
26 Aug 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:* | |
First Time |
Openproject openproject
Openproject |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | () https://github.com/opf/openproject/security/advisories/GHSA-g92v-vrq6-4fpw - Vendor Advisory | |
References | () https://github.com/user-attachments/files/16371759/host-protection.patch - Patch | |
References | () https://www.openproject.org/docs/release-notes/14-3-0 - Release Notes |
26 Jul 2024, 12:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-25 17:15
Updated : 2024-08-26 16:35
NVD link : CVE-2024-41801
Mitre link : CVE-2024-41801
CVE.ORG link : CVE-2024-41801
JSON object : View
Products Affected
openproject
- openproject
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')