A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/May/7 | Mailing List Exploit Third Party Advisory |
https://groups.google.com/forum/#%21msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ | |
https://seclists.org/bugtraq/2019/May/22 | Mailing List Exploit Issue Tracking Third Party Advisory |
https://www.openproject.org/release-notes/openproject-8-3-2/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2019-05-13 20:29
Updated : 2023-11-07 03:03
NVD link : CVE-2019-11600
Mitre link : CVE-2019-11600
CVE.ORG link : CVE-2019-11600
JSON object : View
Products Affected
openproject
- openproject
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')