Description
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
CISA Known Exploited Vulnerability
Date added 2024-12-03 | Due date 2024-12-24
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Problem types
CWE-306 Missing Authentication for Critical Function
Product status
Any version before r1720
Timeline
2023-01-19: | Synactiv discloses to ProjectSend |
2023-05-16: | ProjectSend patches the vulnerability |
2024-07-19: | Synactiv releases an advisory |
2024-08-03: | ProjectSend releases the official patch in r1720 |
2024-08-30: | A Metasploit pull request is opened |
2024-09-03: | A Nuclei pull request is opened |
2024-11-25: | A CVE is assigned |
References
github.com/...ommit/193367d937b1a59ed5b68dd4e60bd53317473744
www.synacktiv.com/...rojectsend-multiple-vulnerabilities.pdf
github.com/.../exploits/linux/http/projectsend_unauth_rce.rb
github.com/...p/vulnerabilities/projectsend-auth-bypass.yaml
vulncheck.com/advisories/projectsend-bypass