We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
Reserved 2024-11-25 | Published 2024-11-26 | Updated 2024-12-06 | Assigner VulnCheckDate added 2024-12-03 | Due date 2024-12-24
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
CWE-287 Improper Authentication
2023-01-19: | Synactiv discloses to ProjectSend |
2023-05-16: | ProjectSend patches the vulnerability |
2024-07-19: | Synactiv releases an advisory |
2024-08-03: | ProjectSend releases the official patch in r1720 |
2024-08-30: | A Metasploit pull request is opened |
2024-09-03: | A Nuclei pull request is opened |
2024-11-25: | A CVE is assigned |
github.com/...ommit/193367d937b1a59ed5b68dd4e60bd53317473744
www.synacktiv.com/...rojectsend-multiple-vulnerabilities.pdf
github.com/.../exploits/linux/http/projectsend_unauth_rce.rb
github.com/...p/vulnerabilities/projectsend-auth-bypass.yaml
vulncheck.com/advisories/projectsend-bypass
Support options