CVE-2024-11680
ProjectSend Unauthenticated Configuration Modification
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- November 25, 2024
- Published Date
- November 26, 2024
- Last Updated
- December 06, 2024
- Vendor
- ProjectSend
- Product
- ProjectSend
- Description
- ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
- Tags
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-12-03 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/projectsend_unauth_rce.rb | 2025-04-29 11:01:14 UTC |
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-11680.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
projectsend_unauth_rce
Type: metasploit • Created: Unknown
D3N14LD15K/CVE-2024-11680_PoC_Exploit
Type: github • Created: 2024-12-04 18:42:43 UTC • Stars: 13
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel
-
Proof of Concept Exploit Available
-
Detected by Nuclei
-
Detected by Metasploit