OpenProject is open source project management software. Prior to version 14.3.0, using a forged HOST header in the default configuration of packaged installations and using the "Login required" setting, an attacker could redirect to a remote host to initiate a phishing attack against an OpenProject user's account. This vulnerability affects default packaged installation of OpenProject without any additional configuration or modules on Apache (such as mod_security, manually setting a host name, having a fallthrough VirtualHost). It might also affect other installations that did not take care to fix the HOST/X-Forwarded-Host headers. Version 14.3.0 includes stronger protections for the hostname from within the application using the HostAuthorization middleware of Rails to reject any requests with a host name that does not match the configured one. Also, all generated links by the application are now ensured to use the built-in hostname. Users who aren't able to upgrade immediately may use mod_security for Apache2 or manually fix the Host and X-Forwarded-Host headers in their proxying application before reaching the application server of OpenProject. Alternatively, they can manually apply the patch to opt-in to host header protections in previous versions of OpenProject.
Metrics
Affected Vendors & Products
References
History
Mon, 26 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openproject
Openproject openproject |
|
CPEs | cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openproject
Openproject openproject |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-25T16:50:16.180Z
Updated: 2024-08-02T04:46:52.668Z
Reserved: 2024-07-22T13:57:37.135Z
Link: CVE-2024-41801
Vulnrichment
Updated: 2024-08-02T04:46:52.668Z
NVD
Status : Modified
Published: 2024-07-25T17:15:11.423
Modified: 2024-11-21T09:33:05.963
Link: CVE-2024-41801
Redhat
No data.