First published: Thu Oct 31 2024(Updated: )
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Frappe Press | =without specific version details |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50356 is a high severity vulnerability, as it allows unauthorized password resets by anyone with access to the mail inbox.
To fix CVE-2024-50356, ensure that email access is secured and consider implementing additional authentication methods beyond 2FA.
CVE-2024-50356 affects the Frappe Press application, a custom app that runs on Frappe Cloud.
Yes, attackers can exploit CVE-2024-50356 to reset passwords without needing to bypass two-factor authentication if they have access to the email inbox.
CVE-2024-50356 does not specify particular versions of Frappe Press, meaning it could be present in multiple deployments.