CVE-2023-33960

OpenProject is web-based project management software. For any OpenProject installation, a `robots.txt` file is generated through the server to denote which routes shall or shall not be accessed by crawlers. These routes contain project identifiers of all public projects in the instance. Prior to version 12.5.6, even if the entire instance is marked as `Login required` and prevents all truly anonymous access, the `/robots.txt` route remains publicly available. Version 12.5.6 has a fix for this issue. Alternatively, users can download a patchfile to apply the patch to any OpenProject version greater than 10.0 As a workaround, one may mark any public project as non-public and give anyone in need of access to the project a membership.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:06

Type Values Removed Values Added
References () https://community.openproject.org/wp/48324 - Permissions Required () https://community.openproject.org/wp/48324 - Permissions Required
References () https://github.com/opf/openproject/pull/12708 - Patch () https://github.com/opf/openproject/pull/12708 - Patch
References () https://github.com/opf/openproject/releases/tag/v12.5.6 - Release Notes () https://github.com/opf/openproject/releases/tag/v12.5.6 - Release Notes
References () https://github.com/opf/openproject/security/advisories/GHSA-xjfc-fqm3-95q8 - Vendor Advisory () https://github.com/opf/openproject/security/advisories/GHSA-xjfc-fqm3-95q8 - Vendor Advisory
References () https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/12708.patch - Mailing List, Patch () https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/12708.patch - Mailing List, Patch

09 Jun 2023, 17:53

Type Values Removed Values Added
CPE cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
First Time Openproject
Openproject openproject
CWE CWE-319
References (MISC) https://github.com/opf/openproject/releases/tag/v12.5.6 - (MISC) https://github.com/opf/openproject/releases/tag/v12.5.6 - Release Notes
References (MISC) https://github.com/opf/openproject/pull/12708 - (MISC) https://github.com/opf/openproject/pull/12708 - Patch
References (MISC) https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/12708.patch - (MISC) https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/12708.patch - Mailing List, Patch
References (MISC) https://github.com/opf/openproject/security/advisories/GHSA-xjfc-fqm3-95q8 - (MISC) https://github.com/opf/openproject/security/advisories/GHSA-xjfc-fqm3-95q8 - Vendor Advisory
References (MISC) https://community.openproject.org/wp/48324 - (MISC) https://community.openproject.org/wp/48324 - Permissions Required
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

01 Jun 2023, 17:29

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-01 17:15

Updated : 2024-11-21 08:06


NVD link : CVE-2023-33960

Mitre link : CVE-2023-33960

CVE.ORG link : CVE-2023-33960


JSON object : View

Products Affected

openproject

  • openproject
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-319

Cleartext Transmission of Sensitive Information