Vulnerability Description
A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper control of resource identifiers. The attack may be initiated remotely. Upgrading to version r1720 is able to address this issue. The patch is named eb5a04774927e5855b9d0e5870a2aae5a3dc5a08. It is recommended to upgrade the affected component.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Projectsend | Projectsend | < r1720 |
Related Weaknesses (CWE)
References
- https://github.com/projectsend/projectsend/commit/eb5a04774927e5855b9d0e5870a2aaPatch
- https://github.com/projectsend/projectsend/releases/tag/r1720Release Notes
- https://vuldb.com/?ctiid.274115Permissions RequiredVDB Entry
- https://vuldb.com/?id.274115Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.385000Third Party AdvisoryVDB Entry
- https://www.kiyell.com/private-files-from-projectsend-idor/
FAQ
What is CVE-2024-7658?
CVE-2024-7658 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper...
How severe is CVE-2024-7658?
CVE-2024-7658 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7658?
Check the references section above for vendor advisories and patch information. Affected products include: Projectsend Projectsend.