SB2024112822 - Authentication bypass in ProjectSend
Published: November 28, 2024 Updated: December 6, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper Authentication (CVE-ID: CVE-2024-11680)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing authorization within the options.php file. A remote non-authenticated attacker can send a specially crafted HTTP request to the application and modify its configuration, which can lead to malicious file uploads and remote code execution.
Remediation
Install update from vendor's website.
References
- https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/projectsend-auth-bypass.yaml
- https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/projectsend_unauth_rce.rb
- https://vulncheck.com/advisories/projectsend-bypass
- https://www.synacktiv.com/sites/default/files/2024-07/synacktiv-projectsend-multiple-vulnerabilities.pdf