Unauthenticated SQL Injection vulnerability in OpenProject (CVE-2019-11600)

Project Description

SEC Consult identified an SQL injection vulnerability in OpenProject, which can be exploited by an attacker to read data records from the database without prior authentication.


Vendor description

“OpenProject is the leading open source project management software. Support your project management process along the entire project life cycle: From project initiation to closure.”

Source: https://www.openproject.org/

 

Business recommendation

The vendor provides a patch which should be applied immediately.

An in-depth security analysis performed by security professionals is highly advised, as the software may be affected from further security issues.

 

Vulnerability overview/description

An SQL injection vulnerability has been identified in the web “activities API”. An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if OpenProject is configured not to require authentication for API access.

 

Proof of concept

Requesting the following URL will trigger a time delay as a proof of concept for exploiting the blind SQL injection:

http:///api/v3/activities/1)%20AND%203281%3d(SELECT%203281%20FROM%20PG_SLEEP(1))%20AND%20(7777%3d7777

 

Vulnerable / tested versions

The vulnerability has been identified in OpenProject version 8.3.1 which was the most current version at the time of discovery.

According to the vendor all versions between 5.0.0 and 8.3.1 are affected.
Older versions (< 5.0.0) are not vulnerable.

 

Vendor contact timeline

2019-04-30Contacting vendor through security@openproject.com
2019-04-30A patch is published in version 8.3.2
2019-05-06Vendor publishes further details
2019-05-10Release of security advisory

 

Solution

The vendor provides a patched version 8.3.2 and a security notice with further information:

https://www.openproject.org/release-notes/openproject-8-3-2
https://groups.google.com/forum/#!msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ

 

Workaround

None.

 

Advisory URL

https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html

 

EOF Thanaphon Soo / @2019

 

Interested to work with the experts of SEC Consult? Send us your application.
Want to improve your own cyber security with the experts of SEC Consult?
Contact our local offices.

Project Details

  • TitleUnauthenticated SQL Injection vulnerability
  • ProductOpenProject
  • Vulnerable version5.0.0 - 8.3.1
  • Fixed version8.3.2 & 9.0.0
  • CVE numberCVE-2019-11600
  • ImpactCritical
  • Homepagehttps://www.openproject.org
  • Found2019-04-17
  • ByT. Soo (Office Bangkok) | SEC Consult Vulnerability Lab

Cookie Preference

Please select an option. You can find more information about the consequences of your choice at Help.

Select an option to continue

Your selection was saved!

Help

Help

To continue, you must make a cookie selection. Below is an explanation of the different options and their meaning.

  • Accept all cookies:
    All cookies such as tracking and analytics cookies.
  • Accept first-party cookies only:
    Only cookies from this website.
  • Reject all tracking cookies:
    No cookies except for those necessary for technical reasons are set.

You can change your cookie setting here anytime: Blog. Blog

Back