vendor:
Frappe Framework (ERPNext)
by:
Sander Ferdinand
7.5
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: Frappe Framework (ERPNext)
Affected Version From: 13.4.2000
Affected Version To: 13.4.2000
Patch Exists: NO
Related CWE: none
CPE: a:frappe:frappe:13.4.0
Platforms Tested: Ubuntu 22.04
2023
Frappe Framework (ERPNext) 13.4.0 – Remote Code Execution (Authenticated)
Silly sandbox escape. Frappe Framework uses the RestrictedPython library to restrict access to methods available for server scripts. The exploit requires the 'System Manager' role and the server config 'server_script_enabled' set to 'true'. It allows an authenticated attacker to create a new script, execute arbitrary code, and escape the sandbox.
Mitigation:
To mitigate this vulnerability, ensure that the 'System Manager' role is assigned only to trusted users. Also, set the server config 'server_script_enabled' to 'false' to disable server scripts.