Learn about CVE-2023-46127 affecting Frappe web application framework. Understand the impact, technical details, affected systems, and mitigation steps to prevent HTML injection risks.
Frappe vulnerable to HTML injection by any Desk user
Understanding CVE-2023-46127
Frappe, a full-stack web application framework, is susceptible to HTML injection by any Desk user. This vulnerability, identified as CVE-2023-46127, falls under CWE-79.
What is CVE-2023-46127?
CVE-2023-46127 exposes a security flaw in Frappe that allows malicious users with desk access to create documents containing HTML payloads, leading to HTML Injection.
The Impact of CVE-2023-46127
This vulnerability could be exploited by threat actors to inject malicious HTML code into documents, potentially leading to cross-site scripting attacks and unauthorized data manipulation.
Technical Details of CVE-2023-46127
The vulnerability is rated with a CVSS 3.1 base score of 5.4, indicating a medium severity level with low confidentiality and integrity impacts. It requires low privileges and user interaction, with a low attack complexity.
Vulnerability Description
The vulnerability in Frappe allows any Desk user to inject HTML code into documents, enabling potential exploitation.
Affected Systems and Versions
Frappe versions prior to 14.49.0 are affected by this HTML injection vulnerability.
Exploitation Mechanism
Malicious users with desk access can leverage this vulnerability to insert harmful HTML payloads into documents.
Mitigation and Prevention
To address CVE-2023-46127, immediate actions are required to secure Frappe instances and prevent potential exploitation.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security advisories and patches for Frappe to ensure timely application of updates.