Skip to main content

CVE-2024-0545: Open Redirect in CodeCanyon RISE Ultimate Project Manager

Medium
VulnerabilityCVE-2024-0545cvecve-2024-0545open-redirect
Published: Mon Jan 15 2024 (01/15/2024, 06:00:05 UTC)
Source: CVE
Vendor/Project: CodeCanyon
Product: RISE Ultimate Project Manager

Description

A vulnerability classified as problematic was found in CodeCanyon RISE Ultimate Project Manager 3.5.3. This vulnerability affects unknown code of the file /index.php/signin. The manipulation of the argument redirect with the input http://evil.com leads to open redirect. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/20/2025, 14:06:19 UTC

Technical Analysis

CVE-2024-0545 is an open redirect vulnerability identified in version 3.5.3 of the CodeCanyon RISE Ultimate Project Manager, a project management web application. The vulnerability resides in the /index.php/signin endpoint, specifically in the handling of the 'redirect' parameter. By manipulating this parameter with an arbitrary URL such as 'http://evil.com', an attacker can cause the application to redirect users to malicious external sites. This vulnerability is exploitable remotely without authentication or user interaction, making it accessible to any attacker who can send crafted requests to the affected endpoint. Open redirect vulnerabilities typically enable phishing attacks, facilitate social engineering, and can be leveraged to bypass security controls such as URL filters or same-origin policies. Although the vulnerability is classified as 'medium' severity and no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The lack of a patch or mitigation guidance from the vendor at this time further elevates the threat. The vulnerability does not directly compromise the confidentiality or integrity of the project manager application’s data but can be used as a vector to redirect users to malicious sites that may attempt credential theft, malware delivery, or other secondary attacks.

Potential Impact

For European organizations using RISE Ultimate Project Manager 3.5.3, this vulnerability poses a significant risk primarily in the form of social engineering and phishing attacks. Employees redirected to attacker-controlled sites may inadvertently disclose credentials or download malware, potentially leading to broader network compromise. The impact is especially critical in sectors where project management tools are integrated with sensitive workflows, such as finance, healthcare, and government. The open redirect can also undermine user trust in internal tools and complicate compliance with data protection regulations like GDPR if user data is compromised downstream. While the vulnerability itself does not directly allow data exfiltration or system takeover, it serves as an enabler for more sophisticated attacks that can impact confidentiality and availability indirectly. The remote and unauthenticated nature of the exploit increases the attack surface, especially for organizations with externally accessible instances of the application.

Mitigation Recommendations

Organizations should immediately audit their deployment of RISE Ultimate Project Manager to identify any instances running version 3.5.3. Since no official patch is currently available, administrators should implement temporary mitigations such as input validation and sanitization on the 'redirect' parameter to restrict redirects only to trusted internal URLs. Web application firewalls (WAFs) can be configured to detect and block requests containing suspicious redirect parameters pointing to external domains. Additionally, organizations should educate users about the risk of phishing and encourage verification of URLs before clicking links, especially those originating from the project management tool. Monitoring web server logs for unusual redirect patterns can help detect exploitation attempts. Finally, organizations should maintain close contact with the vendor or CodeCanyon marketplace for updates or patches and plan for prompt application of any forthcoming fixes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-14T18:53:30.136Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf7e82

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 2:06:19 PM

Last updated: 7/28/2025, 10:55:02 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats