A SQL injection issue was discovered in ERPNext 10.x and 11.x through 11.0.3-beta.29. This attack is only available to a logged-in user; however, many ERPNext sites allow account creation via the web. No special privileges are needed to conduct the attack. By calling a JavaScript function that calls a server-side Python function with carefully chosen arguments, a SQL attack can be carried out which allows SQL queries to be constructed to return any columns from any tables in the database. This is related to /api/resource/Item?fields= URIs, frappe.get_list, and frappe.call.
References
Link | Resource |
---|---|
https://github.com/frappe/erpnext/issues/15337 | Third Party Advisory |
https://github.com/frappe/erpnext/issues/15337 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/frappe/erpnext/issues/15337 - Third Party Advisory |
Information
Published : 2018-12-11 17:29
Updated : 2024-11-21 04:00
NVD link : CVE-2018-20061
Mitre link : CVE-2018-20061
CVE.ORG link : CVE-2018-20061
JSON object : View
Products Affected
frappe
- erpnext
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')