// For flags

CVE-2021-43830

SQL injection in OpenProject

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

OpenProject is a web-based project management software. OpenProject versions >= 12.0.0 are vulnerable to a SQL injection in the budgets module. For authenticated users with the "Edit budgets" permission, the request to reassign work packages to another budget unsufficiently sanitizes user input in the `reassign_to_id` parameter. The vulnerability has been fixed in version 12.0.4. Versions prior to 12.0.0 are not affected. If you're upgrading from an older version, ensure you are upgrading to at least version 12.0.4. If you are unable to upgrade in a timely fashion, the following patch can be applied: https://github.com/opf/openproject/pull/9983.patch

OpenProject es un software de administración de proyectos basado en la web. OpenProject versiones posteriores a 12.0.0 incluyéndola, son vulnerables a una inyección SQL en el módulo budgets. Para los usuarios autenticados con el permiso "Edit budgets", la petición para reasignar paquetes de trabajo a otro presupuesto no sanea suficientemente la entrada del usuario en el parámetro "reassign_to_id". La vulnerabilidad ha sido corregida en la versión 12.0.4. Las versiones anteriores a la 12.0.0 no están afectadas. Si está actualizando desde una versión anterior, asegúrese de que está actualizando al menos a la versión 12.0.4. Si no puede actualizar a tiempo, puede aplicar el siguiente parche: https://github.com/opf/openproject/pull/9983.patch

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-11-16 CVE Reserved
  • 2021-12-14 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-09-12 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openproject
Search vendor "Openproject"
Openproject
Search vendor "Openproject" for product "Openproject"
>= 12.0.0 < 12.0.4
Search vendor "Openproject" for product "Openproject" and version " >= 12.0.0 < 12.0.4"
-
Affected