A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/May/7 | Mailing List Exploit Third Party Advisory |
https://groups.google.com/forum/#%21msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ | |
https://seclists.org/bugtraq/2019/May/22 | Mailing List Exploit Issue Tracking Third Party Advisory |
https://www.openproject.org/release-notes/openproject-8-3-2/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-13T19:57:47
Updated: 2019-05-13T19:57:47
Reserved: 2019-04-30T00:00:00
Link: CVE-2019-11600
JSON object: View
NVD Information
Status : Modified
Published: 2019-05-13T20:29:02.697
Modified: 2023-11-07T03:03:03.703
Link: CVE-2019-11600
JSON object: View
Redhat Information
No data.
CWE