Description
ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
Problem types
Authorization Bypass Through User-Controlled Key
Product status
Credits
Mirabbas Ağalarov
References
www.exploit-db.com/exploits/51400
www.exploit-db.com/exploits/51400 (ExploitDB-51400)
www.projectsend.org/ (Official Product Homepage)
www.vulncheck.com/...t-reference-file-download-vulnerability (VulnCheck Advisory: ProjectSend r1605 Insecure Direct Object Reference File Download Vulnerability)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.