Vulnerabilities (CVE)

Filtered by vendor Frappe Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-6145 1 Frappe 1 Erpnext 2022-05-12 6.5 MEDIUM 8.8 HIGH
An SQL injection vulnerability exists in the frappe.desk.reportview.get functionality of ERPNext 11.1.38. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2019-20529 1 Frappe 1 Frappe 2021-07-21 5.0 MEDIUM 7.5 HIGH
In core/doctype/prepared_report/prepared_report.py in Frappe 11 and 12, data files generated with Prepared Report were being stored as public files (no authentication is required to access; having a link is sufficient) instead of private files.
CVE-2020-27508 1 Frappe 1 Frappe 2020-12-14 5.0 MEDIUM 7.5 HIGH
In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.
CVE-2019-14966 1 Frappe 1 Frappe 2019-08-16 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. There exists an authenticated SQL injection.
CVE-2018-20061 1 Frappe 1 Erpnext 2019-01-02 5.0 MEDIUM 7.5 HIGH
A SQL injection issue was discovered in ERPNext 10.x and 11.x through 11.0.3-beta.29. This attack is only available to a logged-in user; however, many ERPNext sites allow account creation via the web. No special privileges are needed to conduct the attack. By calling a JavaScript function that calls a server-side Python function with carefully chosen arguments, a SQL attack can be carried out which allows SQL queries to be constructed to return any columns from any tables in the database. This is related to /api/resource/Item?fields= URIs, frappe.get_list, and frappe.call.
CVE-2017-1000120 1 Frappe 1 Frappe 2017-10-13 6.5 MEDIUM 8.8 HIGH
[ERPNext][Frappe Version <= 7.1.27] SQL injection vulnerability in frappe.share.get_users allows remote authenticated users to execute arbitrary SQL commands via the fields parameter.