ProjectSend.CVE-2024-11680.Authentication.Bypass
Description
This indicates an attempt to exploit an Authentication Bypass vulnerability in ProjectSend.
The vulnerability is due to improper authorization checks, where certain PHP pages execute privileged actions before verifying user authentication and permissions. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could lead to unauthorized account creation, arbitrary file uploads, and remote code execution on the server.
Affected Products
ProjectSend versions prior to r1720
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply patch, available from the website.
https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |