CVE-2021-43830

OpenProject is a web-based project management software. OpenProject versions >= 12.0.0 are vulnerable to a SQL injection in the budgets module. For authenticated users with the "Edit budgets" permission, the request to reassign work packages to another budget unsufficiently sanitizes user input in the `reassign_to_id` parameter. The vulnerability has been fixed in version 12.0.4. Versions prior to 12.0.0 are not affected. If you're upgrading from an older version, ensure you are upgrading to at least version 12.0.4. If you are unable to upgrade in a timely fashion, the following patch can be applied: https://github.com/opf/openproject/pull/9983.patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*

History

20 Dec 2021, 16:47

Type Values Removed Values Added
CPE cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.4
v2 : 6.5
v3 : 8.8
References (MISC) https://github.com/opf/openproject/releases/tag/v12.0.4 - (MISC) https://github.com/opf/openproject/releases/tag/v12.0.4 - Release Notes, Third Party Advisory
References (MISC) https://github.com/opf/openproject/pull/9983.patch - (MISC) https://github.com/opf/openproject/pull/9983.patch - Patch, Third Party Advisory
References (MISC) https://github.com/opf/openproject/pull/9983 - (MISC) https://github.com/opf/openproject/pull/9983 - Patch, Third Party Advisory
References (CONFIRM) https://github.com/opf/openproject/security/advisories/GHSA-f565-3whr-6m96 - (CONFIRM) https://github.com/opf/openproject/security/advisories/GHSA-f565-3whr-6m96 - Third Party Advisory

14 Dec 2021, 20:32

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-14 20:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-43830

Mitre link : CVE-2021-43830

CVE.ORG link : CVE-2021-43830


JSON object : View

Products Affected

openproject

  • openproject
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')