CVE-2024-50356

Source
https://cve.org/CVERecord?id=CVE-2024-50356
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50356.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-50356
Aliases
  • GHSA-g7mf-rm73-r7g9
Published
2024-10-31T18:02:42.440Z
Modified
2025-12-05T07:18:16.519795Z
Severity
  • 0.0 (None) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N CVSS Calculator
Summary
Press has a potential 2FA bypass
Details

Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.

Database specific
{
    "cwe_ids": [
        "CWE-640"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50356.json"
}
References

Affected packages

Git / github.com/frappe/press

Affected ranges

Type
GIT
Repo
https://github.com/frappe/press
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50356.json"