CVE-2024-41801 – OpenProject packaged installation has Open Redirect Vulnerability in Sign-In in default configuration
https://notcve.org/view.php?id=CVE-2024-41801
OpenProject is open source project management software. Prior to version 14.3.0, using a forged HOST header in the default configuration of packaged installations and using the "Login required" setting, an attacker could redirect to a remote host to initiate a phishing attack against an OpenProject user's account. This vulnerability affects default packaged installation of OpenProject without any additional configuration or modules on Apache (such as mod_security, manually setting a host name, having a fallthrough VirtualHost). It might also affect other installations that did not take care to fix the HOST/X-Forwarded-Host headers. Version 14.3.0 includes stronger protections for the hostname from within the application using the HostAuthorization middleware of Rails to reject any requests with a host name that does not match the configured one. • https://github.com/opf/openproject/security/advisories/GHSA-g92v-vrq6-4fpw https://github.com/user-attachments/files/16371759/host-protection.patch https://www.openproject.org/docs/release-notes/14-3-0 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2023-33960 – OpenProject vulnerable to project identifier information leakage through robots.txt
https://notcve.org/view.php?id=CVE-2023-33960
OpenProject is web-based project management software. For any OpenProject installation, a `robots.txt` file is generated through the server to denote which routes shall or shall not be accessed by crawlers. These routes contain project identifiers of all public projects in the instance. Prior to version 12.5.6, even if the entire instance is marked as `Login required` and prevents all truly anonymous access, the `/robots.txt` route remains publicly available. Version 12.5.6 has a fix for this issue. Alternatively, users can download a patchfile to apply the patch to any OpenProject version greater than 10.0 As a workaround, one may mark any public project as non-public and give anyone in need of access to the project a membership. • https://community.openproject.org/wp/48324 https://github.com/opf/openproject/pull/12708 https://github.com/opf/openproject/releases/tag/v12.5.6 https://github.com/opf/openproject/security/advisories/GHSA-xjfc-fqm3-95q8 https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/12708.patch • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2023-31140 – OpenProject user sessions not terminated after activation of 2FA
https://notcve.org/view.php?id=CVE-2023-31140
OpenProject is open source project management software. Starting with version 7.4.0 and prior to version 12.5.4, when a user registers and confirms their first two-factor authentication (2FA) device for an account, existing logged in sessions for that user account are not terminated. Likewise, if an administrators creates a mobile phone 2FA device on behalf of a user, their existing sessions are not terminated. The issue has been resolved in OpenProject version 12.5.4 by actively terminating sessions of user accounts having registered and confirmed a 2FA device. As a workaround, users who register the first 2FA device on their account can manually log out to terminate all other active sessions. • https://community.openproject.org/wp/48035 https://github.com/opf/openproject/pull/12508 https://github.com/opf/openproject/security/advisories/GHSA-xfp9-qqfj-x28q https://www.openproject.org/docs/release-notes/12-5-4 • CWE-613: Insufficient Session Expiration •
CVE-2021-32763 – Regular Expression Denial of Service in OpenProject forum messages
https://notcve.org/view.php?id=CVE-2021-32763
OpenProject is open-source, web-based project management software. In versions prior to 11.3.3, the `MessagesController` class of OpenProject has a `quote` method that implements the logic behind the Quote button in the discussion forums, and it uses a regex to strip `<pre>` tags from the message being quoted. The `(.|\s)` part can match a space character in two ways, so an unterminated `<pre>` tag containing `n` spaces causes Ruby's regex engine to backtrack to try 2<sup>n</sup> states in the NFA. This will result in a Regular Expression Denial of Service. • https://github.com/opf/openproject/pull/9447.patch https://github.com/opf/openproject/security/advisories/GHSA-qqvp-j6gm-q56f • CWE-400: Uncontrolled Resource Consumption •
CVE-2019-17092 – OpenProject 10.0.1 / 9.0.3 Cross Site Scripting
https://notcve.org/view.php?id=CVE-2019-17092
An XSS vulnerability in project list in OpenProject before 9.0.4 and 10.x before 10.0.2 allows remote attackers to inject arbitrary web script or HTML via the sortBy parameter because error messages are mishandled. Una vulnerabilidad de tipo XSS en la lista de proyectos en OpenProject versiones anteriores a 9.0.4 y versiones 10.x anteriores a 10.0.2, permite a atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro sortBy porque los mensajes de error son manejados inapropiadamente. OpenProject versions 9.0.3 and below and 10.0.1 and below suffer from multiple cross site scripting vulnerabilities. • http://packetstormsecurity.com/files/154851/OpenProject-10.0.1-9.0.3-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2019/Oct/29 https://groups.google.com/forum/#%21topic/openproject-security/tEsx0UXWxXA https://seclists.org/bugtraq/2019/Oct/19 https://www.openproject.org/release-notes/openproject-10-0-2 https://www.openproject.org/release-notes/openproject-9-0-4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •