Vulnerability Description
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Projectsend | Projectsend | < r1720 |
Related Weaknesses (CWE)
References
- https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilitBroken LinkThird Party Advisory
- https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd5Patch
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linuExploit
- https://vulncheck.com/advisories/projectsend-bypassThird Party Advisory
- https://www.synacktiv.com/sites/default/files/2024-07/synacktiv-projectsend-multMitigationTechnical DescriptionThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-US Government Resource
FAQ
What is CVE-2024-11680?
CVE-2024-11680 is a vulnerability with a CVSS score of 9.8 (CRITICAL). ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, e...
How severe is CVE-2024-11680?
CVE-2024-11680 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-11680?
Check the references section above for vendor advisories and patch information. Affected products include: Projectsend Projectsend.