Vulnerability Description
An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The sort_by and start parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Frappe | Erpnext | 10.1.6 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560ExploitThird Party Advisory
FAQ
What is CVE-2018-3884?
CVE-2018-3884 is a vulnerability with a CVSS score of 8.8 (HIGH). An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The sort_by and st...
How severe is CVE-2018-3884?
CVE-2018-3884 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-3884?
Check the references section above for vendor advisories and patch information. Affected products include: Frappe Erpnext.