OP 29 November, 2024 - 10:08 AM
Threat actors are using public exploits for a critical authentication bypass flaw in ProjectSend to upload webshells and gain remote access to servers.
The flaw, tracked as CVE-2024-11680, is a critical authentication bug impacting ProjectSend versions before r1720, allowing attackers to send specially crafted HTTP requests to 'options.php' to change the application's configuration.
Successful exploitation allows the creation of rogue accounts, planting webshells, and embedding malicious JavaScript code.
Though the flaw was fixed on May 16, 2023, it was not assigned a CVE until yesterday, leaving users unaware of its severity and the urgency of applying the security update.
According to VulnCheck, which has detected active exploitation, the patching pace has been abysmal so far, with 99% of ProjectSend instances still running a vulnerable version.
Thousands of instances exposed
ProjectSend is an open-source file-sharing web application designed to facilitate secure, private file transfers between a server administrator and clients.
It is a moderately popular application used by organizations that prefer self-hosted solutions over third-party services like Google Drive and Dropbox.
Censys reports that there are roughly 4,000 public-facing ProjectSend instances online, most of which are vulnerable, says VulnCheck.
Specifically, the researchers report that, based on Shodan data, 55% of the exposed instances run r1605, released in October 2022, 44% use an unnamed release from April 2023, and only 1% is on r1750, the patched version.
VulnCheck reports seeing active exploitation of CVE-2024-11680 that extends beyond just testing, including altering system settings to enable user registration, gaining unauthorized access, and deploying webshells to maintain control over compromised servers.
This activity increased since September 2024, when Metasploit and Nuclei released public exploits for CVE-2024-11680.
"VulnCheck noticed that public-facing ProjectSend servers had started to change their landing page titles to long, random-ish strings," reads the report.
"These long and random-ish names are in line with how both Nuclei and Metasploit implement their vulnerability testing logic."
"Both exploit tools modify the victim's configuration file to alter the sitename (and therefore HTTP title) with a random value."
GreyNoise lists 121 IPs linked to this activity, suggesting widespread attempts rather than an isolated source.
VulnCheck warns that the webshells are stored in the 'upload/files' directory, with names generated from a POSIX timestamp, the username's SHA1 hash, and the original file name/extension.
Direct access to these files through the web server indicates active exploitation.
The researchers warn that upgrading to ProjectSend version r1750 as soon as possible is critical as attacks are likely already widespread.