Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-11680 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: ProjectSend r1720- has an **Improper Authentication** flaw. Attackers bypass login to modify configs. πŸ’₯ **Consequences**: Full system compromise, arbitrary PHP code execution, and total data loss.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-306** (Improper Authentication) & **CWE-287**. The app fails to verify identity for sensitive actions like `options.php`. πŸ“‰ **Flaw**: Missing access control checks allow unauthenticated writes.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **ProjectSend** versions **prior to r1720** (e.g., r1605 and older). 🌐 **Component**: The core PHP application logic handling configuration and user management.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Attackers gain **Admin-level** access without credentials. πŸ“‚ **Data**: Can create accounts, enable file uploads, modify whitelists, and execute **Arbitrary PHP Code** on the server.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. No authentication required (PR:N). Low complexity (AC:L). No user interaction needed (UI:N). 🎯 **Config**: Exploits via crafted HTTP requests to `options.php`.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit**: **Yes, Public**. PoCs exist on GitHub (e.g., `famixcm`, `D3N14LD15K`). Metasploit module available. 🌍 **Wild Exploitation**: High risk due to ease of use and critical impact.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for ProjectSend instances. Check version number (< r1720). Use Nuclei templates (`CVE-2024-11680.yaml`). πŸ§ͺ **Test**: Attempt unauthenticated POST to `options.php` (Do not exploit in prod!).

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. Patch available in **ProjectSend r1720**. πŸ“ **Commit**: `193367d937b1a59ed5b68dd4e60bd53317473744`. Upgrade immediately to the latest version.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, **restrict access** to `options.php` via WAF or firewall rules. Disable file upload features if possible. Monitor logs for unauthorized config changes.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL (9.8 CVSS)**. Immediate action required. Remote Code Execution (RCE) is possible. πŸƒ **Priority**: Patch to r1720+ **NOW** to prevent server takeover.