In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users.
References
Link | Resource |
---|---|
https://github.com/frappe/frappe/blob/v13.0.2/frappe/chat/doctype/chat_message/chat_message.py#L134 | Exploit Third Party Advisory |
https://github.com/frappe/frappe/blob/v13.0.2/frappe/chat/doctype/chat_message/chat_message.py#L155 | Exploit Third Party Advisory |
https://www.mend.io/vulnerability-database/CVE-2022-23055 | Exploit Patch Third Party Advisory |
https://github.com/frappe/frappe/blob/v13.0.2/frappe/chat/doctype/chat_message/chat_message.py#L134 | Exploit Third Party Advisory |
https://github.com/frappe/frappe/blob/v13.0.2/frappe/chat/doctype/chat_message/chat_message.py#L155 | Exploit Third Party Advisory |
https://www.mend.io/vulnerability-database/CVE-2022-23055 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/frappe/frappe/blob/v13.0.2/frappe/chat/doctype/chat_message/chat_message.py#L134 - Exploit, Third Party Advisory | |
References | () https://github.com/frappe/frappe/blob/v13.0.2/frappe/chat/doctype/chat_message/chat_message.py#L155 - Exploit, Third Party Advisory | |
References | () https://www.mend.io/vulnerability-database/CVE-2022-23055 - Exploit, Patch, Third Party Advisory |
07 Nov 2023, 03:44
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : unknown |
Information
Published : 2022-06-22 09:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-23055
Mitre link : CVE-2022-23055
CVE.ORG link : CVE-2022-23055
JSON object : View
Products Affected
frappe
- erpnext
CWE
CWE-862
Missing Authorization