Lucene search

K
cveGitHub_MCVE-2024-35224
HistoryMay 23, 2024 - 1:15 p.m.

CVE-2024-35224

2024-05-2313:15:09
CWE-80
GitHub_M
web.nvd.nist.gov
57
openproject
cost report
stored xss
tablesorter
misconfiguration
permissions
project admin
system admin
privilege escalation
attachment
javascript
csp policy
vulnerability
patched
nvd
cve-2024-35224

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0

Percentile

9.0%

OpenProject is the leading open source project management software. OpenProject utilizes tablesorter inside of the Cost Report feature. This dependency, when misconfigured, can lead to Stored XSS via {icon} substitution in table header values. This attack requires the permissions “Edit work packages” as well as “Add attachments”. A project admin could attempt to escalate their privileges by sending this XSS to a System Admin. Otherwise, if a full System Admin is required, then this attack is significantly less impactful. By utilizing a ticket’s attachment, you can store javascript in the application itself and bypass the application’s CSP policy to achieve Stored XSS. This vulnerability has been patched in version(s) 14.1.0, 14.0.2 and 13.4.2.

Affected configurations

Vulners
Node
opfopenprojectRange13.4.013.4.2
OR
opfopenprojectRange<14.1.0
OR
opfopenprojectRange14.0.014.0.2
VendorProductVersionCPE
opfopenproject*cpe:2.3:a:opf:openproject:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "opf",
    "product": "openproject",
    "versions": [
      {
        "version": ">= 13.4.0, < 13.4.2",
        "status": "affected"
      },
      {
        "version": "< 14.1.0",
        "status": "affected"
      },
      {
        "version": ">= 14.0.0, < 14.0.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVE-2024-35224