RSS   Podatności dla 'Projectsend'   RSS

2021-10-11
 
CVE-2021-40884

CWE-863
 

 
Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application.

 
 
CVE-2021-40886

CWE-22
 

 
Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization.

 
 
CVE-2021-40887

CWE-22
 

 
Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.

 
 
CVE-2021-40888

CWE-79
 

 
Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code.

 
2021-01-26
 
CVE-2020-28874

CWE-269
 

 
reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic. Errors are not properly considered (an invalid token parameter).

 
2019-05-22
 
CVE-2018-7201

CWE-74
 

 
CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.

 
 
CVE-2018-7202

CWE-79
 

 
An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page.

 
2019-04-26
 
CVE-2019-11533

CWE-79
 

 
Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML.

 
 
CVE-2019-11492

CWE-532
 

 
ProjectSend before r1070 writes user passwords to the server logs.

 
2019-04-20
 
CVE-2019-11378

CWE-434
 

 
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.

 


Copyright 2024, cxsecurity.com

 

Back to Top