Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Critical flaw in ProjectSend when actively exploited against public servers
Global Security

Critical flaw in ProjectSend when actively exploited against public servers

AdminBy AdminNovember 27, 2024No Comments2 Mins Read
Active Exploitation
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 27, 2024Ravi LakshmananSoftware Vulnerability / Security

Active operation

A critical security flaw affecting the open-source file-sharing program ProjectSend is likely to be actively exploited in the wild, according to findings by VulnCheck.

The vulnerability, originally patched over a year and a half ago as part of a to commit released in May 2023, not officially available until August 2024. along with Release of version r1720. As of November 26, 2024, it has been assigned a CVE ID CVE-2024-11680 (CVSS Score: 9.8).

Cyber ​​security

Synacktiv, which reported the flaw to project developers in January 2023, described it as an improper authorization check that would allow an attacker to execute malicious code on sensitive servers.

“In ProjectSend version r1605, an improper authorization check was discovered that could allow an attacker to perform sensitive actions, such as enabling user registration and automatic verification or adding new entries to the whitelist of allowed file extensions for uploaded files,” according to a report published in July 2024 .

“Ultimately, this allows you to execute arbitrary PHP code on the server that hosts the application.”

VulnCheck reports that unknown threat actors targeting public ProjectSend servers have been observed using exploit code released by Project Discovery and Rapid7. It is believed that the exploitation attempts began in September 2024.

Active operation

The attacks were also found to allow the user registration feature to gain privileges after authentication for further use, indicating that they are not limited to scanning vulnerable instances.

“We’re probably in ‘webshell attacker’ territory (technically, the vulnerability also allows an attacker to embed malicious JavaScript, which could be an interesting and different attack scenario),” said VulnCheck’s Jacob Baines.

Cyber ​​security

“If an attacker has downloaded a webshell, it can be found in a predictable location in downloads/files/ outside of the web directory.”

An analysis of the ProjectSend servers open on the Internet showed that only 1% of them are running the patched version (r1750), and all other instances are running either the unnamed release or r1605, which was released in October 2022.

In light of what appears to be widespread exploitation, users are encouraged to apply the latest patches as soon as possible to mitigate the active threat.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.