SEC Consult identified an SQL injection vulnerability in OpenProject, which can be exploited by an attacker to read data records from the database without prior authentication.
“OpenProject is the leading open source project management software. Support your project management process along the entire project life cycle: From project initiation to closure.”
The vendor provides a patch which should be applied immediately.
An in-depth security analysis performed by security professionals is highly advised, as the software may be affected from further security issues.
An SQL injection vulnerability has been identified in the web “activities API”. An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if OpenProject is configured not to require authentication for API access.
Proof of concept
Requesting the following URL will trigger a time delay as a proof of concept for exploiting the blind SQL injection:
Vulnerable / tested versions
The vulnerability has been identified in OpenProject version 8.3.1 which was the most current version at the time of discovery.
According to the vendor all versions between 5.0.0 and 8.3.1 are affected.
Older versions (< 5.0.0) are not vulnerable.
Vendor contact timeline
|2019-04-30||Contacting vendor through firstname.lastname@example.org|
|2019-04-30||A patch is published in version 8.3.2|
|2019-05-06||Vendor publishes further details|
|2019-05-10||Release of security advisory|
The vendor provides a patched version 8.3.2 and a security notice with further information:
EOF Thanaphon Soo / @2019
Contact our local offices.
- TitleUnauthenticated SQL Injection vulnerability
- Vulnerable version5.0.0 - 8.3.1
- Fixed version8.3.2 & 9.0.0
- CVE numberCVE-2019-11600
- ByT. Soo (Office Bangkok) | SEC Consult Vulnerability Lab