A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access.
References
Link | Resource |
---|---|
https://www.openproject.org/release-notes/openproject-8-3-2/ | Vendor Advisory |
https://seclists.org/bugtraq/2019/May/22 | Mailing List Exploit Issue Tracking Third Party Advisory |
http://seclists.org/fulldisclosure/2019/May/7 | Mailing List Exploit Third Party Advisory |
http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://groups.google.com/forum/#%21msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ |
Configurations
History
07 Nov 2023, 03:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-05-13 20:29
Updated : 2023-11-07 03:03
NVD link : CVE-2019-11600
Mitre link : CVE-2019-11600
JSON object : View
Products Affected
openproject
- openproject
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')