6 results (0.002 seconds)

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

OpenProject is open source project management software. Prior to version 14.3.0, using a forged HOST header in the default configuration of packaged installations and using the "Login required" setting, an attacker could redirect to a remote host to initiate a phishing attack against an OpenProject user's account. This vulnerability affects default packaged installation of OpenProject without any additional configuration or modules on Apache (such as mod_security, manually setting a host name, having a fallthrough VirtualHost). It might also affect other installations that did not take care to fix the HOST/X-Forwarded-Host headers. Version 14.3.0 includes stronger protections for the hostname from within the application using the HostAuthorization middleware of Rails to reject any requests with a host name that does not match the configured one. • https://github.com/opf/openproject/security/advisories/GHSA-g92v-vrq6-4fpw https://github.com/user-attachments/files/16371759/host-protection.patch https://www.openproject.org/docs/release-notes/14-3-0 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

OpenProject is web-based project management software. For any OpenProject installation, a `robots.txt` file is generated through the server to denote which routes shall or shall not be accessed by crawlers. These routes contain project identifiers of all public projects in the instance. Prior to version 12.5.6, even if the entire instance is marked as `Login required` and prevents all truly anonymous access, the `/robots.txt` route remains publicly available. Version 12.5.6 has a fix for this issue. Alternatively, users can download a patchfile to apply the patch to any OpenProject version greater than 10.0 As a workaround, one may mark any public project as non-public and give anyone in need of access to the project a membership. • https://community.openproject.org/wp/48324 https://github.com/opf/openproject/pull/12708 https://github.com/opf/openproject/releases/tag/v12.5.6 https://github.com/opf/openproject/security/advisories/GHSA-xjfc-fqm3-95q8 https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/12708.patch • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

OpenProject is open-source, web-based project management software. In versions prior to 11.3.3, the `MessagesController` class of OpenProject has a `quote` method that implements the logic behind the Quote button in the discussion forums, and it uses a regex to strip `<pre>` tags from the message being quoted. The `(.|\s)` part can match a space character in two ways, so an unterminated `<pre>` tag containing `n` spaces causes Ruby's regex engine to backtrack to try 2<sup>n</sup> states in the NFA. This will result in a Regular Expression Denial of Service. • https://github.com/opf/openproject/pull/9447.patch https://github.com/opf/openproject/security/advisories/GHSA-qqvp-j6gm-q56f • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.1EPSS: 18%CPEs: 2EXPL: 0

An XSS vulnerability in project list in OpenProject before 9.0.4 and 10.x before 10.0.2 allows remote attackers to inject arbitrary web script or HTML via the sortBy parameter because error messages are mishandled. Una vulnerabilidad de tipo XSS en la lista de proyectos en OpenProject versiones anteriores a 9.0.4 y versiones 10.x anteriores a 10.0.2, permite a atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro sortBy porque los mensajes de error son manejados inapropiadamente. OpenProject versions 9.0.3 and below and 10.0.1 and below suffer from multiple cross site scripting vulnerabilities. • http://packetstormsecurity.com/files/154851/OpenProject-10.0.1-9.0.3-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2019/Oct/29 https://groups.google.com/forum/#%21topic/openproject-security/tEsx0UXWxXA https://seclists.org/bugtraq/2019/Oct/19 https://www.openproject.org/release-notes/openproject-10-0-2 https://www.openproject.org/release-notes/openproject-9-0-4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.1EPSS: 94%CPEs: 1EXPL: 4

A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access. Una vulnerabilidad de inyección SQL en la API de actividades en OpenProject antes de 8.3.2 permite a un atacante remoto ejecutar comandos SQL arbitrarios a través del parámetro id. El ataque se puede realizar sin autenticar si OpenProject está configurado para no requerir autenticación para el acceso a la API. OpenProject versions 5.0.0 through 8.3.1 suffer from a remote SQL injection vulnerability. • https://www.exploit-db.com/exploits/46838 http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html http://seclists.org/fulldisclosure/2019/May/7 https://groups.google.com/forum/#%21msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ https://seclists.org/bugtraq/2019/May/22 https://www.openproject.org/release-notes/openproject-8-3-2 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •