CVE-2019-11600

A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access.
References
Link Resource
https://www.openproject.org/release-notes/openproject-8-3-2/ Vendor Advisory
https://seclists.org/bugtraq/2019/May/22 Mailing List Exploit Issue Tracking Third Party Advisory
https://groups.google.com/forum/#!msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ Mailing List Patch Third Party Advisory
http://seclists.org/fulldisclosure/2019/May/7 Mailing List Exploit Third Party Advisory
http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*

Information

Published : 2019-05-13 13:29

Updated : 2019-05-14 06:44


NVD link : CVE-2019-11600

Mitre link : CVE-2019-11600


JSON object : View

CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Advertisement

dedicated server usa

Products Affected

openproject

  • openproject