// For flags

CVE-2024-11680

ProjectSend Improper Authentication Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.

Las versiones de ProjectSend anteriores a r1720 se ven afectadas por una vulnerabilidad de autenticación incorrecta. Los atacantes remotos no autenticados pueden aprovechar esta falla enviando solicitudes HTTP manipuladas a options.php, lo que permite la modificación no autorizada de la configuración de la aplicación. La explotación exitosa permite a los atacantes crear cuentas, cargar webshells e incrustar JavaScript malicioso.

ProjectSend contains an improper authentication vulnerability that allows a remote, unauthenticated attacker to enable unauthorized modification of the application's configuration via crafted HTTP requests to options.php. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-11-25 CVE Reserved
  • 2024-11-26 CVE Published
  • 2024-12-03 Exploited in Wild
  • 2024-12-05 First Exploit
  • 2024-12-06 CVE Updated
  • 2024-12-17 EPSS Updated
  • 2024-12-24 KEV Due Date
CWE
  • CWE-287: Improper Authentication
CAPEC
  • CAPEC-114: Authentication Abuse
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -