#VU101016 Improper Authentication in ProjectSend - CVE-2024-11680
Published: November 28, 2024 / Updated: December 6, 2024
ProjectSend
ProjectSend
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing authorization within the options.php file. A remote non-authenticated attacker can send a specially crafted HTTP request to the application and modify its configuration, which can lead to malicious file uploads and remote code execution.
Remediation
External links
- https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/projectsend-auth-bypass.yaml
- https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/projectsend_unauth_rce.rb
- https://vulncheck.com/advisories/projectsend-bypass
- https://www.synacktiv.com/sites/default/files/2024-07/synacktiv-projectsend-multiple-vulnerabilities.pdf