Unauthenticated SQL Injection Vulnerability In Openproject (CVE-2019-11600)

Title

Unauthenticated SQL Injection vulnerability

Product

OpenProject

Vulnerable Version

5.0.0 - 8.3.1

Fixed Version

8.3.2 & 9.0.0

CVE Number

CVE-2019-11600

Impact

critical

Found

17.04.2019

By

T. Soo (Office Bangkok) | SEC Consult Vulnerability Lab

SEC Consult identified an SQL injection vulnerability in OpenProject, which can be exploited by an attacker to read data records from the database without prior authentication.

Vendor Description

“OpenProject is the leading open source project management software. Support your project management process along the entire project life cycle: From project initiation to closure.”

Source: https://www.openproject.org/

 

Business Recommendation

The vendor provides a patch which should be applied immediately.

An in-depth security analysis performed by security professionals is highly advised, as the software may be affected from further security issues.

 

Vulnerability Overview/ Description

An SQL injection vulnerability has been identified in the web “activities API”. An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if OpenProject is configured not to require authentication for API access.

 

Proof Of Concept

Requesting the following URL will trigger a time delay as a proof of concept for exploiting the blind SQL injection:

http:///api/v3/activities/1)%20AND%203281%3d(SELECT%203281%20FROM%20PG_SLEEP(1))%20AND%20(7777%3d7777

 

Vulnerable / Tested Versions

The vulnerability has been identified in OpenProject version 8.3.1 which was the most current version at the time of discovery.

According to the vendor all versions between 5.0.0 and 8.3.1 are affected.
Older versions (< 5.0.0) are not vulnerable.

Vendor Contact Timeline

2019-04-30 Contacting vendor through security@openproject.com
2019-04-30 A patch is published in version 8.3.2
2019-05-06 Vendor publishes further details
2019-05-10 Release of security advisory

Solution

The vendor provides a patched version 8.3.2 and a security notice with further information:

https://www.openproject.org/release-notes/openproject-8-3-2
https://groups.google.com/forum/#!msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ

 

Workaround

None.

 

Advisory URL

https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html

 

EOF Thanaphon Soo / @2019

Contact

Interested to work with the experts of SEC Consult? Send us your application.
Want to improve your own cyber security with the experts of SEC Consult?
Contact our local offices.