Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Critical flaw in ProjectSend when actively exploited against public servers
Global Security

Critical flaw in ProjectSend when actively exploited against public servers

AdminBy AdminNovember 27, 2024No Comments2 Mins Read
Active Exploitation
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 27, 2024Ravi LakshmananSoftware Vulnerability / Security

Active operation

A critical security flaw affecting the open-source file-sharing program ProjectSend is likely to be actively exploited in the wild, according to findings by VulnCheck.

The vulnerability, originally patched over a year and a half ago as part of a to commit released in May 2023, not officially available until August 2024. along with Release of version r1720. As of November 26, 2024, it has been assigned a CVE ID CVE-2024-11680 (CVSS Score: 9.8).

Cyber ​​security

Synacktiv, which reported the flaw to project developers in January 2023, described it as an improper authorization check that would allow an attacker to execute malicious code on sensitive servers.

“In ProjectSend version r1605, an improper authorization check was discovered that could allow an attacker to perform sensitive actions, such as enabling user registration and automatic verification or adding new entries to the whitelist of allowed file extensions for uploaded files,” according to a report published in July 2024 .

“Ultimately, this allows you to execute arbitrary PHP code on the server that hosts the application.”

VulnCheck reports that unknown threat actors targeting public ProjectSend servers have been observed using exploit code released by Project Discovery and Rapid7. It is believed that the exploitation attempts began in September 2024.

Active operation

The attacks were also found to allow the user registration feature to gain privileges after authentication for further use, indicating that they are not limited to scanning vulnerable instances.

“We’re probably in ‘webshell attacker’ territory (technically, the vulnerability also allows an attacker to embed malicious JavaScript, which could be an interesting and different attack scenario),” said VulnCheck’s Jacob Baines.

Cyber ​​security

“If an attacker has downloaded a webshell, it can be found in a predictable location in downloads/files/ outside of the web directory.”

An analysis of the ProjectSend servers open on the Internet showed that only 1% of them are running the patched version (r1750), and all other instances are running either the unnamed release or r1605, which was released in October 2022.

In light of what appears to be widespread exploitation, users are encouraged to apply the latest patches as soon as possible to mitigate the active threat.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.