CVE-2023-33960

high

Description

OpenProject is web-based project management software. For any OpenProject installation, a `robots.txt` file is generated through the server to denote which routes shall or shall not be accessed by crawlers. These routes contain project identifiers of all public projects in the instance. Prior to version 12.5.6, even if the entire instance is marked as `Login required` and prevents all truly anonymous access, the `/robots.txt` route remains publicly available. Version 12.5.6 has a fix for this issue. Alternatively, users can download a patchfile to apply the patch to any OpenProject version greater than 10.0 As a workaround, one may mark any public project as non-public and give anyone in need of access to the project a membership.

References

https://patch-diff.githubusercontent.com/raw/opf/openproject/pull/12708.patch

https://github.com/opf/openproject/security/advisories/GHSA-xjfc-fqm3-95q8

https://github.com/opf/openproject/releases/tag/v12.5.6

https://github.com/opf/openproject/pull/12708

https://community.openproject.org/wp/48324

Details

Source: Mitre, NVD

Published: 2023-06-01

Updated: 2023-06-09

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Severity: High

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High