Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-11680 PoC — ProjectSend 安全漏洞

Source
Associated Vulnerability
Title:ProjectSend 安全漏洞 (CVE-2024-11680)
Description:ProjectSend(cFTP)是ProjectSend开源的一套基于PHP和MySQL的自托管应用程序。 ProjectSend r1720之前版本存在安全漏洞,该漏洞源于受到身份验证漏洞的影响,远程未经身份验证的攻击者可以通过发送精心设计的HTTP请求实现对应用程序配置的未经授权修改。
Description
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.
Readme
# CVE-2024-11680 PoC Exploit
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.

![alt text](https://i.imgur.com/C2F7CFy.png)

---

## Features
- Exploits CSRF to modify the application title. This is the vulnerability confirmation.
- Enables insecure options (client registration, auto-approval, and file uploads).
- Registers a new user to demonstrate privilege misconfiguration issues.
- Automatically restores the original application title after testing.

---

## Usage

### Prerequisites
1. A valid target running r1605 or earlier of **ProjectSend**.
2. curl: This script uses curl to send HTTP requests.
You can check if curl is installed by running:

```bash command -v curl```

If it's not installed, you can install it using your package manager. For example, on Ubuntu:

```sudo apt-get install curl```


### Running the Exploit
1. Clone this repository or download the script.
2. Run the exploit using the following syntax:
   ```./exploit -u TARGET_URL```
4. Check the output for the generated username and password for the registered user.

---

## Disclaimer
This exploit is intended for ethical testing within authorized environments, such as responsible disclosure programs or Vulnerability Disclosure Programs (VDPs). The authors are not responsible for misuse or unauthorized actions taken using this script.

---

## Author
**D3N14LD15K**  
- d3n14ld15k[at]bugcrowdninja[dot]com
File Snapshot

[4.0K] /data/pocs/5269d4442d8033bc918d46bcc01b7d2d50e1ee65 ├── [6.3K] exploit.sh └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.