We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49751

Frappe Press possible HTML injection through SaaS Signup inputs



Description

Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Prior to commit 5d118a902872d7941f099ad1fb918e2421e79ccd, a user could inject HTML through SaaS signup inputs. The user who injected the unsafe HTML code would only affect themselves and would not affect other users. Commit 5d118a902872d7941f099ad1fb918e2421e79ccd patches this bug.

Reserved 2024-10-18 | Published 2024-10-23 | Updated 2024-10-23 | Assigner GitHub_M


LOW: 1.2CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:U

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 5d118a902872d7941f099ad1fb918e2421e79ccd
affected

References

github.com/.../press/security/advisories/GHSA-rf69-h96f-rf2j

github.com/...ommit/5d118a902872d7941f099ad1fb918e2421e79ccd

cve.org (CVE-2024-49751)

nvd.nist.gov (CVE-2024-49751)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-49751

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.