CVE-2024-50356 (GCVE-0-2024-50356)
Vulnerability from cvelistv5 – Published: 2024-10-31 18:02 – Updated: 2024-11-01 13:51
VLAI?
Title
Press has a potential 2FA bypass
Summary
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.
Severity ?
CWE
- CWE-640 - Weak Password Recovery Mechanism for Forgotten Password
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-50356",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-01T13:50:47.650226Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-01T13:51:00.632Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "press",
"vendor": "frappe",
"versions": [
{
"status": "affected",
"version": "\u003c ba0007c28ac814260f836849bc07d29beea7deb6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn\u0027t be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-640",
"description": "CWE-640: Weak Password Recovery Mechanism for Forgotten Password",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-31T18:02:42.440Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9"
},
{
"name": "https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6"
}
],
"source": {
"advisory": "GHSA-g7mf-rm73-r7g9",
"discovery": "UNKNOWN"
},
"title": "Press has a potential 2FA bypass"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-50356",
"datePublished": "2024-10-31T18:02:42.440Z",
"dateReserved": "2024-10-22T17:54:40.958Z",
"dateUpdated": "2024-11-01T13:51:00.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn\u0027t be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.\"}, {\"lang\": \"es\", \"value\": \"Press, una aplicaci\\u00f3n personalizada de Frappe que ejecuta Frappe Cloud, administra la infraestructura, la suscripci\\u00f3n, el mercado y el software como servicio (SaaS). Cualquiera que tenga acceso a la bandeja de entrada de correo sin pasar por la autenticaci\\u00f3n de dos factores podr\\u00eda restablecer la contrase\\u00f1a, aunque no podr\\u00edan iniciar sesi\\u00f3n sin pasar por la autenticaci\\u00f3n de dos factores. Solo los usuarios que hayan habilitado la autenticaci\\u00f3n de dos factores se ven afectados. El commit ba0007c28ac814260f836849bc07d29beea7deb6 corrige este error.\"}]",
"id": "CVE-2024-50356",
"lastModified": "2024-11-01T14:35:08.330",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\", \"baseScore\": 0.0, \"baseSeverity\": \"NONE\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 0.0}]}",
"published": "2024-10-31T18:15:05.750",
"references": "[{\"url\": \"https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9\", \"source\": \"security-advisories@github.com\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-640\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-50356\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-10-31T18:15:05.750\",\"lastModified\":\"2024-11-01T14:35:08.330\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn\u0027t be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.\"},{\"lang\":\"es\",\"value\":\"Press, una aplicaci\u00f3n personalizada de Frappe que ejecuta Frappe Cloud, administra la infraestructura, la suscripci\u00f3n, el mercado y el software como servicio (SaaS). Cualquiera que tenga acceso a la bandeja de entrada de correo sin pasar por la autenticaci\u00f3n de dos factores podr\u00eda restablecer la contrase\u00f1a, aunque no podr\u00edan iniciar sesi\u00f3n sin pasar por la autenticaci\u00f3n de dos factores. Solo los usuarios que hayan habilitado la autenticaci\u00f3n de dos factores se ven afectados. El commit ba0007c28ac814260f836849bc07d29beea7deb6 corrige este error.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\",\"baseScore\":0.0,\"baseSeverity\":\"NONE\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":0.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-640\"}]}],\"references\":[{\"url\":\"https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-50356\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-01T13:50:47.650226Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-31T19:57:23.075Z\"}}], \"cna\": {\"title\": \"Press has a potential 2FA bypass\", \"source\": {\"advisory\": \"GHSA-g7mf-rm73-r7g9\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 0, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"frappe\", \"product\": \"press\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c ba0007c28ac814260f836849bc07d29beea7deb6\"}]}], \"references\": [{\"url\": \"https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9\", \"name\": \"https://github.com/frappe/press/security/advisories/GHSA-g7mf-rm73-r7g9\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6\", \"name\": \"https://github.com/frappe/press/commit/ba0007c28ac814260f836849bc07d29beea7deb6\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn\u0027t be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-640\", \"description\": \"CWE-640: Weak Password Recovery Mechanism for Forgotten Password\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-10-31T18:02:42.440Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-50356\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-01T13:51:00.632Z\", \"dateReserved\": \"2024-10-22T17:54:40.958Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-10-31T18:02:42.440Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…