A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access.
References
Link | Resource |
---|---|
https://www.openproject.org/release-notes/openproject-8-3-2/ | Vendor Advisory |
https://seclists.org/bugtraq/2019/May/22 | Mailing List Exploit Issue Tracking Third Party Advisory |
https://groups.google.com/forum/#!msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ | Mailing List Patch Third Party Advisory |
http://seclists.org/fulldisclosure/2019/May/7 | Mailing List Exploit Third Party Advisory |
http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2019-05-13 13:29
Updated : 2019-05-14 06:44
NVD link : CVE-2019-11600
Mitre link : CVE-2019-11600
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
openproject
- openproject