{ "schema_version": "1.4.0", "id": "GHSA-c233-43hc-2x3j", "modified": "2024-04-04T00:37:06Z", "published": "2022-05-24T16:45:33Z", "aliases": [ "CVE-2019-11600" ], "details": "A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11600" }, { "type": "WEB", "url": "https://groups.google.com/forum/#!msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ" }, { "type": "WEB", "url": "https://groups.google.com/forum/#%21msg/openproject-security/XlucAJMxmzM/hESpOaFVAwAJ" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/May/22" }, { "type": "WEB", "url": "https://www.openproject.org/release-notes/openproject-8-3-2" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/152806/OpenProject-8.3.1-SQL-Injection.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2019/May/7" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-05-13T20:29:00Z" } }