CVE-2024-50356 (GCVE-0-2024-50356)
Vulnerability from cvelistv5
Published
2024-10-31 18:02
Modified
2024-11-01 13:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-640 - Weak Password Recovery Mechanism for Forgotten Password
Summary
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-50356", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-01T13:50:47.650226Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-01T13:51:00.632Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "press", "vendor": "frappe", "versions": [ { "status": "affected", "version": "\u003c ba0007c28ac814260f836849bc07d29beea7deb6" } ] } ], "descriptions": [ { "lang": "en", "value": "Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn\u0027t be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-640", "description": "CWE-640: Weak Password Recovery Mechanism for Forgotten Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-31T18:02:42.440Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9" }, { "name": "https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6" } ], "source": { "advisory": "GHSA-g7mf-rm73-r7g9", "discovery": "UNKNOWN" }, "title": "Press has a potential 2FA bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-50356", "datePublished": "2024-10-31T18:02:42.440Z", "dateReserved": "2024-10-22T17:54:40.958Z", "dateUpdated": "2024-11-01T13:51:00.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-50356\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-10-31T18:15:05.750\",\"lastModified\":\"2024-11-01T14:35:08.330\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn\u0027t be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.\"},{\"lang\":\"es\",\"value\":\"Press, una aplicaci\u00f3n personalizada de Frappe que ejecuta Frappe Cloud, administra la infraestructura, la suscripci\u00f3n, el mercado y el software como servicio (SaaS). Cualquiera que tenga acceso a la bandeja de entrada de correo sin pasar por la autenticaci\u00f3n de dos factores podr\u00eda restablecer la contrase\u00f1a, aunque no podr\u00edan iniciar sesi\u00f3n sin pasar por la autenticaci\u00f3n de dos factores. Solo los usuarios que hayan habilitado la autenticaci\u00f3n de dos factores se ven afectados. El commit ba0007c28ac814260f836849bc07d29beea7deb6 corrige este error.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\",\"baseScore\":0.0,\"baseSeverity\":\"NONE\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":0.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-640\"}]}],\"references\":[{\"url\":\"https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9\",\"source\":\"security-advisories@github.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-50356\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-01T13:50:47.650226Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-31T19:57:23.075Z\"}}], \"cna\": {\"title\": \"Press has a potential 2FA bypass\", \"source\": {\"advisory\": \"GHSA-g7mf-rm73-r7g9\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 0, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"frappe\", \"product\": \"press\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c ba0007c28ac814260f836849bc07d29beea7deb6\"}]}], \"references\": [{\"url\": \"https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9\", \"name\": \"https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6\", \"name\": \"https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn\u0027t be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-640\", \"description\": \"CWE-640: Weak Password Recovery Mechanism for Forgotten Password\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-10-31T18:02:42.440Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-50356\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-01T13:51:00.632Z\", \"dateReserved\": \"2024-10-22T17:54:40.958Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-10-31T18:02:42.440Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…