Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SSA-722410 V1.1 (Last Update: 2025-10-14): Multiple Vulnerabilities in User Management Component (UMC)

    April 26, 2026

    ZDI-26-278: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability

    April 26, 2026

    ProjectSend CVE-2024-11680 Exploited in the Wild | Blog

    April 26, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»ProjectSend CVE-2024-11680 Exploited in the Wild | Blog
    News

    ProjectSend CVE-2024-11680 Exploited in the Wild | Blog

    adminBy adminApril 26, 2026No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Public-facing ProjectSend instances appear to have been exploited by attackers.

    99% of ProjectSend instances remain vulnerable and have not upgraded to the patched version released in August.

    Public exploits have pre-dated CVE assignment by months, including Nuclei templates and a weaponized Metasploit module.

    ProjectSend is an open-source file-sharing web application. The project is moderately popular, with almost 1,500 GitHub stars and more than 4,000 instances indexed by Censys. Although the CVE for this vulnerability was only published today (November 26), the patch has been publicly available for over a year (May 16, 2023). Since the patch release, multiple exploits have been published by Synactiv, Project Discovery (Nuclei), and Rapid7 (Metasploit). The lack of a CVE is an oversight that stands out, particularly given Rapid7’s status as a CNA (CVE Numbering Authority) with Researcher and Open Source scope.

    1. January 19, 2023

      Synactiv discloses to ProjectSend

    2. May 16, 2023

      ProjectSend patches the vulnerability

    3. July 19, 2024

      Synactiv releases an advisory

    4. August 3, 2024

      ProjectSend releases the official patch in r1720

    5. August 30, 2024

      A Metasploit pull request is opened

    6. September 3, 2024

      A Nuclei pull request is opened

    7. November 25, 2024

      VulnCheck assigns CVE-2024-11680

    VulnCheck noticed that public-facing ProjectSend servers had started to change their landing page titles to long, random-ish strings. Some of the “random” names have larger groupings, for example:

    Victims on Shodan

    These long and random-ish names are in line with how both Nuclei and Metasploit implement their vulnerability testing logic. Both exploit tools modify the victim’s configuration file to alter the sitename (and therefore HTTP title) with a random value.

    Nuclei exploit check:

    - raw:
        - |
            POST /options.php HTTP/1.1
            Host: {{Hostname}}
            Content-Type: application/x-www-form-urlencoded
    
            csrf_token={{csrf}}&section=general&this_install_title={{string}}
    

    Metasploit exploit check:

    # Test if the instance is vulnerable by trying to change its title
    params = {
        'csrf_token' => csrf_token,
        'section' => 'general',
        'this_install_title' => random_new_title
    }
    res = send_request_cgi({
        'method' => 'POST',
        'uri' => normalize_uri(datastore['TARGETURI'], 'options.php'),
        'keep_cookie' => true,
        'vars_post' => params
    })
    

    This is a very heavy-handed “test” (although in Metasploit’s defense, they at least try to restore the original value) and not something any “researcher” should actually be doing. Especially considering the application’s publication date is embedded right in the landing page (e.g. you can determine if a vulnerable version is being used without exploiting the target). Regardless, these random titles started to appear in September, just as the Metasploit and Nuclei exploits were made public.

    Victims over time

    While the endpoint might be fairly generic (options.php), our friend over at GreyNoise also appear to index more than one hundred IP addresses hitting that URI.

    Potential attackers on GreyNoise

    What’s more concerning is that attackers don’t appear to stop at “testing.” One of the next steps in exploitation involves enabling user registration (a non-default setting) to gain post-authentication privileges. When this setting is activated, the text on the landing page changes to prompt users to register an account. An example from a victim site follows (the URL and branding of been blocked out):

    Victim with registration enabled

    Given how widespread we are seeing this setting enabled, we think this is likely a bigger problem than “researchers intrusively checking for vulnerable versions.” We are likely in the “attackers installing webshells” territory (technically, the vulnerability also allows the attacker to embed malicious JavaScript, too, which could be an interesting and different attack scenario).

    If an attacker has uploaded a webshell, it can be found in a predictable location in upload/files/ off of the webroot. The files are assigned a predictable name that might help identify exploit timelines as well: {posix timestamp of upload}-{sha1 username}-{original file name}.{original extension}.

    Webshell on disk

    Additionally, these files are not meant to be directly accessed – downloads are intended to go through an entirely different endpoint. Reviewing the server access logs for direct access to upload/files/ will likely be useful in determining exploitation.

    Webshell on disk

    The VulnCheck Initial Access team developed a scanner to fingerprint the versions of internet-facing systems. Using the Shodan data, we found approximately 1% were using the patched version (r1750). 55% are using r1605 (released October 2022), 44% are using an unnamed release (released April 2023), and the remaining 1% are using the patched r1750.

    Given the timeline, evidence of exploitation, and lack of patch adoption, we assume that exploitation is likely widespread. And if not now, then in the near future considering the abysmal patching rates.

    The ProjectSend vulnerability, now identified as CVE-2024-11680, has been publicly known for some time. A patch was released on May 16, 2023, and various exploits have been available for months. However, due to the absence of a CVE assignment, centralized documentation was lacking. With the CVE now assigned and evidence of ongoing exploitation, it is crucial for security companies to assess their customers’ exposure, implement necessary remediations, and conduct incident response activities as needed.

    The VulnCheck Initial Access team is always on the lookout for new exploitation in the wild. For more research like this, see our blogs, PaperCut Exploitation, Fileless Remote Code Execution on Juniper Firewalls
    , and Does Confluence Dream of Shells?

    Sign up to our website today to get free access to our VulnCheck KEV and request a trial of our Initial Access Intelligence and Exploit & Vulnerability Intelligence products.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleIBM security advisory (AV26-365) – Canadian Centre for Cyber Security
    Next Article ZDI-26-278: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability
    admin
    • Website

    Related Posts

    News

    Exploit Intelligence | Blog | VulnCheck

    April 26, 2026
    News

    American utility firm Itron discloses breach of internal IT network

    April 26, 2026
    News

    New ‘Pack2TheRoot’ flaw gives hackers root Linux access

    April 26, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    SSA-722410 V1.1 (Last Update: 2025-10-14): Multiple Vulnerabilities in User Management Component (UMC)

    April 26, 2026

    ZDI-26-278: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability

    April 26, 2026

    ProjectSend CVE-2024-11680 Exploited in the Wild | Blog

    April 26, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.