漏洞描述
OpenProject versions before 12.5.6 generate a publicly accessible robots.txt file revealing project identifiers, even if the instance is set to 'Login required', letting attackers gather project info, exploit requires no authentication.
id: CVE-2023-33960
info:
name: OpenProject < 12.5.4 - Project Identifiers Exposure
author: 0x_Akoko
severity: medium
description: |
OpenProject versions before 12.5.6 generate a publicly accessible robots.txt file revealing project identifiers, even if the instance is set to 'Login required', letting attackers gather project info, exploit requires no authentication.
impact: |
Attackers can enumerate project identifiers, potentially aiding targeted attacks or information gathering.
remediation: |
Upgrade to version 12.5.6 or later, or apply the provided patch to versions above 10.0.
reference:
- https://www.openproject.org/docs/release-notes/12-5-4/
- https://github.com/opf/openproject/security/advisories/GHSA-4r3x-x7xf-h2gc
- https://nvd.nist.gov/vuln/detail/CVE-2023-33960
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2023-33960
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: http.html:"OpenProject"
tags: cve,cve2023,openproject,exposure,api
http:
- method: GET
path:
- "{{BaseURL}}/robots.txt"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "Disallow: /projects/")'
- 'contains_any(body, "/work_packages", "/repository", "/activity")'
condition: and
# digest: 4a0a00473045022100a54702182425096aace40b33db3299d1adf113b0a58f097dff4fe19af8f792c702202711aef16b4d2c4cd186f859bd72004d324e06ab5b1ce33a2f2f64c25793fbb7:922c64590222798bb761d5b6d8e72950