Patch
CVE-2024-11680
with vRx
This script restricts access to the options.php file in your ProjectSend installation to mitigate potential exploitation of CVE-2024-11680. It updates or creates an .htaccess file to block access to this vulnerable endpoint.
✨ Features:
🛡️ Prevents unauthorized access to options.php.
🗂️ Automatically creates or updates .htaccess.
🚦 Checks for duplicate rules to avoid unnecessary modifications.
🔧 Handles errors gracefully with clear messages.
❓ Why It Matters?
CVE-2024-11680 is a critical vulnerability in ProjectSend versions prior to r1720 that allows remote, unauthenticated attackers to exploit the options.php endpoint. This can lead to:
Unauthorized Configuration Changes: Attackers can manipulate application settings without credentials.
Account Creation and Hijacking: Malicious accounts can be created to gain access.
Webshell Uploads: Attackers may upload webshells to execute arbitrary commands.
Data Breaches: Sensitive information may be exposed or modified.
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.