Vulnerability Details : CVE-2023-33960
OpenProject is web-based project management software. For any OpenProject installation, a `robots.txt` file is generated through the server to denote which routes shall or shall not be accessed by crawlers. These routes contain project identifiers of all public projects in the instance. Prior to version 12.5.6, even if the entire instance is marked as `Login required` and prevents all truly anonymous access, the `/robots.txt` route remains publicly available.
Version 12.5.6 has a fix for this issue. Alternatively, users can download a patchfile to apply the patch to any OpenProject version greater than 10.0 As a workaround, one may mark any public project as non-public and give anyone in need of access to the project a membership.
Vulnerability category: Information leak
Products affected by CVE-2023-33960
- cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-33960
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-33960
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-33960
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Secondary)
-
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-33960
-
https://github.com/opf/openproject/security/advisories/GHSA-xjfc-fqm3-95q8
Project identifier information leakage through robots.txt · Advisory · opf/openproject · GitHubVendor Advisory
-
https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/12708.patch
Mailing List;Patch
-
https://community.openproject.org/wp/48324
Sign in | OpenProject CommunityPermissions Required
-
https://github.com/opf/openproject/releases/tag/v12.5.6
Release OpenProject 12.5.6 · opf/openproject · GitHubRelease Notes
-
https://github.com/opf/openproject/pull/12708
Fix/robots txt login required by oliverguenther · Pull Request #12708 · opf/openproject · GitHubPatch
Jump to